0x59616d61, r1) removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=ANY=[@ANYRESOCT]) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) open(&(0x7f0000000080)='./file0\x00', 0x40a00, 0x0) 00:37:28 executing program 0: openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x69440, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB=',']) 00:37:28 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000005a00)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) sendfile(r2, r1, 0x0, 0x8) 00:37:28 executing program 1: r0 = semget$private(0x0, 0x7, 0x0) semop(r0, &(0x7f0000000000)=[{0x0, 0x80}, {0x1, 0xfffb}], 0x2) semtimedop(r0, &(0x7f0000000100)=[{0x0, 0x7fff}], 0x1, 0x0) 00:37:28 executing program 4: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(0xffffffffffffffff, 0xc0182101, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000200)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000100)={r1}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000140)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f0000001580)={r2, 0x1, r0, 0x1000004}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f00000001c0)={r2}) 00:37:28 executing program 3: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000180), 0x2d1ee37) clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r1) removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=ANY=[@ANYRESOCT]) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) open(&(0x7f0000000080)='./file0\x00', 0x40a00, 0x0) 00:37:28 executing program 2: close(0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000040)) openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) sendmsg$NL80211_CMD_UNEXPECTED_FRAME(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080), 0xc, 0x0}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c47, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ppoll(&(0x7f0000002000)=[{r1, 0x2103, 0x64}], 0x1, 0x0, 0x0, 0x0) 00:37:28 executing program 0: ioprio_set$pid(0x2, 0x0, 0x4004) 00:37:28 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000005a00)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) sendfile(r2, r1, 0x0, 0x8) 00:37:28 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) r0 = open(&(0x7f0000000140)='.\x00', 0x0, 0x0) renameat2(r0, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) 00:37:28 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xf7, &(0x7f0000000900)="c4c69101a219da3643bf168384924fe41e52ffffff7fc5d61abc6cd1b3dd80000098d3e0a5fc79c0fe7282987364e69e6fe42ff9373a5efaa8b507c946a8cc45edef31ede99a1af0f0824f1047f42bf98adf49a9f092b0dfc95e6bdf88ce57f97c69df8c00000000d109a542b558357f3dafa9f8657bbfc245c5ed4446bcd6c8146f85d9f04ec60802b102424c7bad7f5cb689e4400e9028ffb4e7904942cc575ba851c65cb6def4ad4fc7ff71e86915ad4b9374c6f11f1dc4a018af00838f8dd196fddac4e63b0093034ec558cd17d1e85e298abdaf98b19126b1812411389f692b2875438ba4008537a3337d52c5e56a7ec6a954e0ce"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x17) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() tkill(r3, 0x40) 00:37:28 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="82bb7102cc6560ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856729a952b000000000000000000000093d5b8c2fc903c2b54706c05e4cb2e2875107608f9143f299d8e3f78f4bf076484885fd4089cb084607435b77c7f44cf0783279a494c8e4eba955b16e77f57966d4b79ce63a7560f2950035254b654ed339b07ebcf3b498fccba20bcae2b6f577b36b79f72f77ef0d450a8f25ea6cd09", 0xa4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x6, 0x0) 00:37:28 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000005a00)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) sendfile(r2, r1, 0x0, 0x8) 00:37:28 executing program 1: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$KEYCTL_MOVE(0xb, r0, 0xfffffffffffffff8, 0xffffffffffffffff, 0x0) 00:37:28 executing program 0: perf_event_open(&(0x7f0000001340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback, 0x7f}, 0x1c) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0xe00) 00:37:28 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000005a00)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) sendfile(r2, r1, 0x0, 0x8) 00:37:28 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="82bb7102cc6560ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856729a952b000000000000000000000093d5b8c2fc903c2b54706c05e4cb2e2875107608f9143f299d8e3f78f4bf076484885fd4089cb084607435b77c7f44cf0783279a494c8e4eba955b16e77f57966d4b79ce63a7560f2950035254b654ed339b07ebcf3b498fccba20bcae2b6f577b36b79f72f77ef0d450a8f25ea6cd09", 0xa4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x6, 0x0) [ 314.621182][ T25] kauditd_printk_skb: 88044 callbacks suppressed [ 314.621193][ T25] audit: type=1326 audit(1619743048.900:1474670): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 314.652175][ T25] audit: type=1326 audit(1619743048.910:1474671): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 314.676568][ T25] audit: type=1326 audit(1619743048.910:1474672): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 314.700906][ T25] audit: type=1326 audit(1619743048.910:1474673): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 314.725329][ T25] audit: type=1326 audit(1619743048.910:1474674): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 314.751433][ T25] audit: type=1326 audit(1619743048.910:1474675): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 314.776305][ T25] audit: type=1326 audit(1619743048.910:1474676): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 314.800643][ T25] audit: type=1326 audit(1619743048.910:1474677): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 314.826247][ T25] audit: type=1326 audit(1619743048.910:1474678): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 314.855622][ T25] audit: type=1326 audit(1619743048.910:1474679): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 00:37:31 executing program 3: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000180), 0x2d1ee37) clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r1) removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=ANY=[@ANYRESOCT]) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) open(&(0x7f0000000080)='./file0\x00', 0x40a00, 0x0) 00:37:31 executing program 1: timer_create(0xb, 0x0, &(0x7f00000000c0)) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x77359400}, {0x0, 0x989680}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}}, &(0x7f0000000380)) 00:37:31 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0003}]}) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f00000000c0)='./file0\x00') mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdirat(r0, &(0x7f0000000180)='./file0/file0\x00', 0x0) r1 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) r2 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) renameat2(r2, &(0x7f0000000100)='./file0\x00', r1, &(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x2) 00:37:31 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000001a00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="66530700ae897094e7b126b097eaa769be6d05c41bd34e677d114b", 0x1b}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x5) tkill(r1, 0x23) ptrace$cont(0x18, r1, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) exit_group(0x0) 00:37:31 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f000099e000)={0x2, 0x4e20, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x17, &(0x7f0000000000), 0x4) 00:37:31 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000000640), 0x301400, 0x0) pselect6(0x40, &(0x7f0000000180)={0x3}, 0x0, &(0x7f0000000240)={0x8}, 0x0, 0x0) 00:37:31 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0003}]}) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f00000000c0)='./file0\x00') mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdirat(r0, &(0x7f0000000180)='./file0/file0\x00', 0x0) r1 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) r2 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) renameat2(r2, &(0x7f0000000100)='./file0\x00', r1, &(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x2) 00:37:31 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000001a00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="66530700ae897094e7b126b097eaa769be6d05c41bd34e677d114b", 0x1b}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x5) tkill(r1, 0x23) ptrace$cont(0x18, r1, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) exit_group(0x0) 00:37:31 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0003}]}) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f00000000c0)='./file0\x00') mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdirat(r0, &(0x7f0000000180)='./file0/file0\x00', 0x0) r1 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) r2 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) renameat2(r2, &(0x7f0000000100)='./file0\x00', r1, &(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x2) 00:37:31 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x33, &(0x7f0000000200)=0x8, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, &(0x7f00000000c0)=""/15, &(0x7f0000000040)=0x10) 00:37:31 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000001a00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="66530700ae897094e7b126b097eaa769be6d05c41bd34e677d114b", 0x1b}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x5) tkill(r1, 0x23) ptrace$cont(0x18, r1, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) exit_group(0x0) 00:37:31 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="82bb7102cc6560ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856729a952b000000000000000000000093d5b8c2fc903c2b54706c05e4cb2e2875107608f9143f299d8e3f78f4bf076484885fd4089cb084607435b77c7f44cf0783279a494c8e4eba955b16e77f57966d4b79ce63a7560f2950035254b654ed339b07ebcf3b498fccba20bcae2b6f577b36b79f72f77ef0d450a8f25ea6cd09", 0xa4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x6, 0x0) [ 319.630942][ T25] kauditd_printk_skb: 97825 callbacks suppressed [ 319.630953][ T25] audit: type=1326 audit(1619743053.911:1572505): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 319.662573][ T25] audit: type=1326 audit(1619743053.921:1572506): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 319.688572][ T25] audit: type=1326 audit(1619743053.921:1572507): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 319.712967][ T25] audit: type=1326 audit(1619743053.921:1572508): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 319.738376][ T25] audit: type=1326 audit(1619743053.921:1572509): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 319.764408][ T25] audit: type=1326 audit(1619743053.921:1572510): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 319.789565][ T25] audit: type=1326 audit(1619743053.921:1572511): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 319.814088][ T25] audit: type=1326 audit(1619743053.921:1572512): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 319.839280][ T25] audit: type=1326 audit(1619743053.921:1572513): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 319.864091][ T25] audit: type=1326 audit(1619743053.921:1572514): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 00:37:34 executing program 3: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000180), 0x2d1ee37) clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r1) removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=ANY=[@ANYRESOCT]) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) open(&(0x7f0000000080)='./file0\x00', 0x40a00, 0x0) 00:37:34 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0003}]}) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f00000000c0)='./file0\x00') mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdirat(r0, &(0x7f0000000180)='./file0/file0\x00', 0x0) r1 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) r2 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) renameat2(r2, &(0x7f0000000100)='./file0\x00', r1, &(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x2) 00:37:34 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0003}]}) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f00000000c0)='./file0\x00') mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdirat(r0, &(0x7f0000000180)='./file0/file0\x00', 0x0) r1 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) r2 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) renameat2(r2, &(0x7f0000000100)='./file0\x00', r1, &(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x2) 00:37:34 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000001a00)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="66530700ae897094e7b126b097eaa769be6d05c41bd34e677d114b", 0x1b}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x5) tkill(r1, 0x23) ptrace$cont(0x18, r1, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) exit_group(0x0) 00:37:34 executing program 1: r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$unlink(0x9, 0x0, r0) 00:37:34 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000200)="ae88bff8240000005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000fffffffffffffff0227377f8", 0x2e}], 0x1) readv(r0, &(0x7f0000001400)=[{&(0x7f0000000140)=""/87, 0x23}], 0x1) 00:37:34 executing program 5: r0 = socket$inet(0x2, 0x3, 0xff) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f0000000040)) 00:37:34 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0003}]}) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f00000000c0)='./file0\x00') mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdirat(r0, &(0x7f0000000180)='./file0/file0\x00', 0x0) r1 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) r2 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) renameat2(r2, &(0x7f0000000100)='./file0\x00', r1, &(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x2) 00:37:34 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0003}]}) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f00000000c0)='./file0\x00') mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdirat(r0, &(0x7f0000000180)='./file0/file0\x00', 0x0) r1 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) r2 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) renameat2(r2, &(0x7f0000000100)='./file0\x00', r1, &(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x2) 00:37:34 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setresgid(0x0, 0x0, r2) setfsgid(r2) 00:37:34 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) recvmmsg(r0, &(0x7f0000001840)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000004ac0)=""/102389, 0x18ff5}], 0x1}}], 0x1, 0x0, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000240)={0x0, 0x2710}, 0x10) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xc63b9e35) 00:37:34 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="82bb7102cc6560ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856729a952b000000000000000000000093d5b8c2fc903c2b54706c05e4cb2e2875107608f9143f299d8e3f78f4bf076484885fd4089cb084607435b77c7f44cf0783279a494c8e4eba955b16e77f57966d4b79ce63a7560f2950035254b654ed339b07ebcf3b498fccba20bcae2b6f577b36b79f72f77ef0d450a8f25ea6cd09", 0xa4}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x6, 0x0) 00:37:37 executing program 1: r0 = add_key(&(0x7f0000000000)='trusted\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)="522e1bfa77db9be56d34e8f2c9359bd5d0c4529c26af47bf3af2422d6a8b2caabf2f1fbb1ccba87aae86561cecdc175e10d6a3e56c477663af355d42b61f60a866abe83330fc2c23c8147056ae23a459f8291daddb37bad55f742cfb5b7b9d77cfa91555b075b97ba6f99b804e0aec088426c3db0e32feeaffc8c3d8062599e4e0f1b4c6f0e93afe3b12280a9b9e384bcafa52ca4c443de73d414c4af969a824064159c599e8b05089da9683f866ebb909405835e7be2086b722e19faebdd422884db637855e1d5b5e8e0fca3f4d9d20f0fe3adeb7360a9b", 0xd8, 0xfffffffffffffffa) keyctl$KEYCTL_PKEY_QUERY(0x18, r0, 0x0, &(0x7f0000000180)='\x00', &(0x7f00000001c0)) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000006c0)=@allocspi={0x23b0, 0x16, 0x1, 0x70bd2c, 0x25dfdbfd, {{{@in=@private=0xa010100, @in=@broadcast, 0x4e22, 0x1ff, 0x4e20, 0x200, 0xa, 0x0, 0x30, 0x16}, {@in, 0x0, 0x33}, @in6=@private1, {0x0, 0x0, 0x161, 0x0, 0x7ff, 0x8001, 0xffffffffffffffe0}, {0x3, 0xaa8, 0x800, 0x2}, {0x0, 0x7ff, 0x6a6}, 0x70bd2d, 0x3502, 0x2, 0x2, 0x5, 0x94}, 0x4, 0x8}, [@XFRMA_SET_MARK_MASK={0x8, 0x1e, 0x7}, @tfcpad={0x8}, @extra_flags={0x8, 0x18, 0x1f}, @algo_aead={0x104c, 0x12, {{'morus1280\x00'}, 0x8000, 0x2a0, "7ee2e854d998b71f5ef4d0abbb7f445735c3b6cedfeb5f989b980fd1dc12377eddd89075200ba7fdc978d7ea2e392a324a11db03aba043b7abc5e9af53e5385356711faca5a14d5610743ea2fda023442bc77e1da47b7425423d5f90eb055e02b12ba183a2b06684e251d5599bbf669637319a32ebb92dfb41b14239483c29c43ba0126ccc63ef573200a79fd00c9eef46d38825e75595767effd416179f21098ec1258bc39bcd868e2def270d6bf2bec7aa5c70db04ac22e51913933a65c0f9116559382f2d75410029cc71fcee9ee8c7d33b8b54a6ab8adb23f2081b33ea1934c67d9530560797f257c96ba5f8bb9f3e9cb88528541954609559b3642cc9f4140b6eab7bbb61c15ec845fe559804b575b1afe4a18c65cb75201aca1f253c4908fa558f3e564c45be7db9905f4ecbce917fbd0286f71e07ffa26f21ca1a6f30264410140481d15dce79a7adb6fa1af97f977cca843394e4b70e41e2b2d7e10ea8cb8c6f05617c26c8df317ffd344761c162fa1004f0331f21da3de21a42ddcdb20abe7e5ad8bc78366aaf0b86c07c3cd311a2cf4ddbfd00e69fa0050cf6d7bd07b88fd069106baf0efa7a83c6f5acf3b2e846291710c249fd739cb4322905ac895081c0ee618ce3bf25c6cf6ef5b45987576fe11954608be9d7360009c69b8d90fc06ca30e1e9ac22df12868e86896075c6384e1772a74c4ad818ea63fa1841f56d1ef7986288e1dd19393b7cf85275440ce16639ff9b04d6ade394ee808bb668b34f1e0acd4a2d5fef2c8275eabde2d69ff0cdde9f3d08f78eb31b5eee11e289a7d23643c33750bc1278e82b5009b65c5cdd1c63e62a35b2dab15f6cb8ea98dc67ec55623c52f2d988b9fc61f62f16d15f996b5b65f918bfd8b10e9135b2243a52d81a1baceefd98f8c46c1b447528df8d0d691e9d90683d201a02f1be14d3aef2be47719b310d7424419ea6303b038485d5334cde36aeec6e8a668924f75d1f546ce8d97d95a49bd3cc387498bf3cde23836d791b5dce95015e0f0c98baeff99ac43b4408ac928c9076070da7b6e2601821ed20c65868acf7f62926af8f17229b52fce9e4f935793aff265656b9dfec52defafc45856dfaf1ac73a13df163db9d451093af419b2da21edf838c695389a33ea3c4b657255151f748b66003f2a954352024e537305fc1fa58141a8e4f7f422dfa8a5c1897e516c6dd14f5441dc1ca0758d7c5a888fdf7d906f7716e604a8c4c8ee2c808c812f352d8229e3f371127eed7c2a8aab8957868105c5d0344a4f7555e113ab4ee9f08198e878a759b6cefa211ebf0fb5ee1e5cdd0fd0bb8936a2abd427a0580e91cb607f475873ee4ce10f4db95c805fe8e1ded889bd085b9bf196470d90d9db67ed9b5e77b526671469ca2dd4535949339440de4cf89d48d019c691216410892312d9682fde464bd9aefe98bfe8b756662267abc1fd3a3420068c4690dac2ef6a816ee31505b0242306d12cc5c89284492c0c11b69559679ba4a7f5e64f33b2a7364a328a61f19f94f8f6d6e85ae627a0563d885cf3fc078b8e1a24c93cb32820878ac5e532c5c84bd9d3ac65d123ef6b01e5143d5676a892aa230415872c97f35e18cc7878227d61399aa575b2cf567b83f76c8c3df8116d701f5cd77ffb0a2474993c6ff6d408deb762d9922498a700118f045df9040d1f7490b06f81525ad3992443989e8a395fb577f207fcdf75971d5b268eaa59e1043687c50408fe1c4d73f2c7fbd4df5c00c9733801dc70a36ae4345d02bf07a45ff5405c17bd59ed1b35446fea3e45c8280bfe3daad484f7db773cb3cb238e7e84370233569353a62d5ec8d04e01731c2966c509ee7a251c9ca754e63ca0f97e066b4da8be8b958bd46f1cfcdb3234590137f85c3671086c7bae96bb0cf5c017a11707d8d34dd160f71fb8dfe355f57e2140ade8c318c01acbc089f02b40d0c48d69c98360be38038e75d92f380c7ca462770b3c3f0990ef72254c11054f0d5b079523d6f0db35246b9af882c28c7d12a6a0c211ab3af300f6341a2a8e18ebdbfd01971b7f53ae07087c7f5053a23ae029bffa2e3cba19d23a512993baaf848ee2148e561e887960a4cc3aed4072addb03832403ef8eb47773c3f4f88ddc19299b762f645bad1b5aa3ec8d2cd5ba18ce635a266f1b176347fb78125440a5c77c7ac3d015de02d316b33be6741c4f11cb6f9384cb8fd6f34c880c37528d566d0f0dbfbdd2aab8558cfa27f5dcab53081de7c08921fc17c4d910154d69f5688b0462c7d919c0470a3b8f4506b6894341a9b6afbfc7c19aa447836ecb8acd2d8a1574bd873eb395f83aac3ab39ef5db6503db5e868f4c0342812f9a878fb4917408590a6ce18b72bc3815bc57c672f6de92540e7c1c31e702d57aa9135576be9408a0c0d59b5e5e53238870f9ff6d53e127b5d0ae0cfca3330918ed90bcb6ca5add9a4cb40fa559420d30532da21bed2ce5c87cc9f408eddee4e49c38b72b48941b4b12effb83ea88e8ec0d0064ff61e4f7d10e4fb198e4442b7c32e0eb15e9c72833041a85f06d7246d12fbbbae2caef1731e2c5d802bd786a241e62752e66301601e75888c47df330b08ac423376ca26dd880f7bfaf1b6bb0713e85088ba2f75813382c90df55f4e01e548537983b30b310510583ee554ed5b2bc08d1ea17c1d5d0b8d3066b1540d1965c3f199c3039b38c49c765b8d8a294d1f120e03fef597b6f18f7351ad18f16f04c9752c1e8ea75404166936293df37d6ac6754cc430e8fb95be75f6a1357f9f5237906ab6c3cc5495ea998a41e692ee4026125303e286e917f541ebb24a6c18ee21cc8b9236ebd449588f3193638c4327c6422e11948248aec43cadf4e024a7fdd1efb43986b4abc1d348b3686eb8f1cf6379e7deb3dd1f97819cf1546fb5c97eb93349d50c9e0e83d3247301a4fbc980ac3666a7749c13bc038d4608c1e1d366efbb2f7dc3133a925eb380788e56704a583420f50864de3f7f5535cba760f9cfe5b5ac2a4616ab2399737a8429df05820a8d5dd6fb7ab76f076e386b16bf211a9201510fbe32169658452ed5e51c8ddcdbecc6ff94f47734a2c621e0e659cccc7cdcc33480d314bf84af35cdfbaaf3c3da69ccb4cfd4d4d195b36ea6cdf5e8ced62f0a80dfcb52f7923a8ea0e5adb58b0ae46243581b172c08d6d3eac590559a7a166f0a541f3cd17fe9021fdb5d65c0671d15a3d2bc7c7a1870465c57e5e708a42e719cfbb9c3306f885a1e2138cf3932295b9d7910c1b81a882d999aa740016f594e25f02e3b2977516724850044a28a84a0ee82e543dac3cd7a08227700fc5acdf53876d024e05c441c24f60f2b96f1616fb8be78c5689217f129061c164150a72a3e448674c33b98e37a0d5e2428de9713489cca46ecccf97a52a896f1003eb9b90cc76f99e4cd889910f2b8000742e4e8b5111f508c1ee48c0d09f024391f0f629126727d86af9cb8d89bee6db51d0596f3aa0106968991a4941cfc903c1654ec80bf01dae42ad498c2932820a85bf4d1869d3dd7df27f8ece2adff13797ca3a766df90dfb4a264645d1412b068a87e1464a20b11cc45d1971a114a612f36933ca34a27c192e44e998450d550ae7ef0f3a184f74f82a56529909dc08a06c99ddf1e6acda5ab52a5ca142b88e86713c25d30acda46306b6303b2919def656f1616d7da572f9b69f461de94659ec73e89de89bbbe7fe81c0938fd489e0dfd85a69bf66d693998b0457f60e2f8ec7aba3885de1c631df65f2cec5330d7dddd5b276c20e7ab4d1a103ffa1e4d72179d37a4612ea8db2b9d7213905af1c61ff0c37161abc84bb1af3f9f5d1b63793b7c6d40046bf504b2fcdbe568603995be526bc92fdd095525a00a0415cd73227e9ac9742ae7fb7771e1526240ae81b543b3a9ad0490b9b4d3302455cdd1ff3adcef6542a33c5a56c5827ac4444ab7e1df2d446cb29538b6ca957b7b9e92c4040d3c9802480b781ff9574552f4667938a326de8870d26dd6eee1bc33050e3e534c95eb2ce0373981faae8225908fa58123627d83cdb250e8abc61a6d82df10f75d568284b9e99356d2470bb051b9c37c6d43f5af25da437feeee7177275a3518d73f26e14414072e225421dede190722fa5bd4085e760d578d9547c7517253747a6861fb15ef062b8511e88b481c954d6e716a2cdcd7ffccbb87e28e37876a1d5c1152322a1f248eb344c631c963387aba8c24987f48f169c7ed95bf6076bf5dbd9cea7e12cca85041f2998456be646523bc548380f257945b3e6aec72326782bd8597916215af0a40f214b162d6c22474fcfec7d4caaed7dd751e329ce0382496fc33db5f5c973e4c5427200fbb8e544124908483080d5303232bde14888f9ae0ff1bb00f0e1045b515d9a916b30e51ccc8399292c0c819359c13e682a4a256e9cbe192e86fbd61b4f197b1889429722693eabe28031054e9b696a534a18e132aec33e851a9d1920194539a07c51ac01fa0dd05ffaee2adda75faecf20aa2f08a0e1e32390a505388f8f84b7ae20f42d9e97e77d3f04635c6ef064969dc813414acfb49b698957eb5d8901a8b8025771ae2b7ed2997895e27638a4692ab5c24f574c4aa779bab0f5f27198212904e9c3a18c3569ff978f66a523293a2a3307b035a61b6b129cd8232cd52fa4764f9867380f7f93d2b6161b9809172cdc650fea1e23c0232c9ce60d4b85a8793d575f67601c563b869b2bdde57583cee83dd0def0a98ba6c7e7f7e3556866b8c963ed24e8aad1f40c8c2e475da6ba77a16eeea40320bddceec168e9bb06157303a8581842e379328202587f7306c35444d9936aebf9633caa12309ac2e088b0baeda323a0975a4bbbf7fc073bec759a8451967560accbe3d392fdc5c5c9b8a7c988cc5530791ebe489f3fc19a2667b2a8ad96c995c6e37606646187dd29f57032c58ef770a5c2023f917846c2650b874c099fdb741c3fb0230c6acb34842685f9ace5680c97d232184f239a4a7ef6bf46604c8059b14d846a524fd0752dd7aaf37f19fed6e873d8db0f58909145c8a81b1825597c5b2211962b914a580b25ad605410b8ac67bbc4a2433964d6978bbfd523232926080d83061baf3af77dbaffa52e900ca448d19acc413dbbd9f42f99ef419fb57e51c0f35efd302d68a8bce7e3d3b63e73ff9dfa77cc4f303bae3fe38695e1c7db80997f0bf5f72dc1e507cf1d3a2da5b3e43193bd8f5262cd70c1d149b48bb3155b985b2cc0434d54d67de0db797e62f8f9c5f7e065265796f421e2e1eee7590349a7a5ba1eba8edb054ee0f53fc00ff841b973b71bb30cf1377d3f9914083dbaaf3aec9f58c1818c0c0587e8f80b89e9546c3a9e5dda021ad353473018a58649ffbb62e71d87a329df2694d03a8deb28313e7c98ddbebed0d9c4656316b054ce8b73ed5232fab629a2ee70aa7299d384fb3dbb9a3c0e0782fc64406322a36804f70f257f63393bd67eb8b4c4bef6d4b56b71fd2a8572546e10b7d532bceec5b2bfa3f427a4645a90f9a895d977b8c7b4edf5a3b96508c8268fc5994ce3bdd4524412ca976dd98ac5d4176d4ad60d51d431bc201a27c3dc9355b3e00cfe191e5f4f9b098bb562a7cb34399b4526d9645df75f94e75b07a0e41f4e2f5fba1d8183b6d6b4b9494ed16dbc77358b49f73a3c8c7c29a8129e2d85ae6993ba88aabbf95b7e6395e7a675ed89e8381d3c37a8c514faf6d49b5ffd7e019699e98f6d6c26a5384fcd9c139fcbd37b1cdffc6dd60f68be040216ef11d"}}, @algo_comp={0x1048, 0x3, {{'deflate\x00'}, 0x8000, "3b20ba744e10a558bd8c649f73af20e20fa809db37eda89bd1b253a3a8a4a4e1defc4ab60c7f4f7429ba9826ded489abfffe7291764a30d83aacd2e0f15014f409602ffdc5f7a55e78245bbab544cabc5ae26988f03803505906991c3be0ed13522e70f8bdf4abf50d34c2d35ed5dac5a3c0e08c50dc0c2b0124193fc806dff3369d1c4b23bb962cb5a5e45691e9cfabd6730da575ab9713c9bface28ecd4dc57c62eeabe8217787059a0f721f305e8917121b15e80f8897a8f9d9ffddb6d01d2bad60b882faf4050129d6d86cdd83e5e903aff2be2e85a73f6bf6b21eca8ef5d046d6027b727e8b4d3ebf2620357e26665fc9d18b4e3f3ba83edb66cfbc755711fa70e6812bc95ba272872870f0266fc656b8f6e50a40756c34605e31b433fc8d0357d3d0c305c05b920bd233285c427624bff49be91f71215eef0c27692ded4afbb4a0034fc562762c1620e39a2fc6771c48f88ba0e2936c156ab2eb214a16a512213fab1fe365eb88eda4c3657d256206092a9b7ed52425d479c905890c5a1514b23783846fca93edb0658bb7742b49edbdeef37ae0dd0dc023378160d62bd7d1b25020bbf1402364480979095ac8145cbd2a4239aefaef02f3a4415b0ea4ad593ec48bc5a734f5e96fadac3d8bee61466f615bfe37be3a5c68d7a74d6f68dae2b347ae1558025a8205aa058b61d4d4463f24772ced8dcc4120b422c20e9662d4cb15661f3c55166fb2331b6f2f1920d9bd0b67ab0da2b6890bc3d1fa9be6057d3cf1555f729f4d0ab7e231f42fc04dddb2c51c86c3dca175fba96a2aff1fadcaa9bbcd5d221c2e5910bc0bee468ee3d5dbf5c17140e2fa8f490a4753dc6ae73290970830f9a01fd1b5de620c045abfaeed582d53bab5183f2c964868465b21acbc16a9ebf2ffdebefa589d8e340b5987a62981b35ca97666cda1b69fab7d8b78eb82e599d95801697bd87c4c1c310e4159a288240c4b47bc8084e9671cacf785557a1fed2fbb2fb2d5527a1b21b2648de68fa098f1a9590e2938b48c31c28c7d92921df12bed631fb2fac177f946dce88829f3452822c1066493785251de37c3f22846efb3f227dcb440e5804b26a87de9b325eeb7e54ef06e8feaeb8d5ac681923f055bb00ecc8c6177a155e085e9b470fa1fda06b10a43bdd5adc0eaff0624df2d379a11101b619b1cdfe851667f779c340a0c98cb5b0abfe0798146588954bb5d208bcde35482b7b9fa6ec2a3c09f2976a148a665d4802fe6929508925d1781be1c32141647231160bea5abbd7fe1a058ffc95c135dceca22c1cb7c7e060e27a9784615d2d68c86b13be5662399d4707623c82c456d6c1c66fac663c1442f8104c16c89f8d4346144e9668c7eb300aff1f8f4115490a87bdbdb867636c617c56913106284960973b4ef28b77ab0496c860dfece39ae8656345a97a2d1178e38a9e4e5864c860a10de9cd21b653af5ed3461f4e9a2f41b80f59bf424f87fe7417579cc23accebe9d1acc76daefa135e3ed3e3d19eb6b356408c510bdba689dfc1e0f78dc613410eec2610e95be46464956592527de523c16bddeed7fb33a4a8d02544762af3a0d3edb50a89a6732465f23082e2e836c5f4589b39654c821fd917ed513e7f3708c6261dbc255566f0fdc9e44e00fb68b42cc7c8abec45988299c6eb622e58b6d6e8bd61108596053e203e91bb92910621f97cd04184f4d562a6b79a71d684c16224a7e73fe2023703188ae587c21a23701cba9ad2fc2ae2b6f1758dceaf4f0138b01196a1091cfbd6d40461c70bad9ea64ab2a549ba643f39ccc5220e756d0a2295fd38176c9b1137131c1cdf131cd08068ef945b97f12ea8f6f0c2290b01954c96efb11bda689866676e20d6a757dbbf7f652a7fe38666d34c800df692a7d0a1e2f2580bf579aa2f0c6f063389a9e6799a36615b3eccd81386e8f450d174fba067cfc3e2a14283024feb2f10b2cb09fa99c28c6dd0361e9c486647fb83dfb10ced7e6de941b3d7d91f8b158dcc5f2372e620f22c5c25c7b4e3c143955f12b17275fac64dc2444d1245da77b4eed40952d4e04575861e2b40f3f2375e99c7d9319d9913bc7bc10ed7fa00cc24e823ccc4509dd147b907d3af1f0a4e16c9368c54961894f58ed418fccc8162239fe51bfdeaec2e4e68f98dde517b88d324390667015e70fbabf40176413ef1a4c2cc43cbe905999e4380de09576f32e56e90502694b7760d23732139a80680133e540c1cfa54a8187f36da04bcf8af370ef0c862face67b5e78e8afd9bad6feada2d80461528abc22906f28db99abd6ea8421a877784039301827c26f6cd0832faf0c6b3bfb18f06323940f7299787e15b8fb6e3dc4699fa1cda596ccb2c4a299a4a83174d69df79c4e84da79b00829353df90225f1c31eb88408a2c4a49639603443672de53d99e48f5f8e5e27b1eeddfe274ed3089eadf2c0932914334751a46d09ddd8a38c28908fdd0e7efd7620a942f3c92fa7e49f6ad2ff8c17903485f1231eab92c5ec4813b2756b2c3a7e3807c56bc04ab4c0cb3e47e27ae0cf3272b643a5b0fd3e19ff5f07156a82ddba0c829943e7873d0358b908a83f6843ce704ff92106cd13f8a7228163a22af25d53f524f9ccc3e80f5a1357b1dae192ecfbad49d9703259008121a16c857c2bdabd557e45016334d40086d3a4e05a9d679c07b78d283671bef9b94303b7327c8e61334804d6da360cd596eca9fa8655a7e2f49273f3648f6b67d7073ad95fcd912ecc17aec66099565c4f36f174a06a1440c4d3a493a68c06760b8505411053eaa450b0ef4ae3292367ae0cc0838d1118bd1b8e9ed0eafccf7cb153a958af79b2008f9f7dd7b5bf822144cd0c6f062f5552e59c79222b3fc9aa62c64d4ec92bc98a761c3a460a3e2ac86d58839ac9d3b6cd25485b980e4f0c182c21fbf2ba04441c0e34d6bf898f7ae0bc70f5940b8e9f098fbf6689f164517ee836439a2f0d253b03b8be6b685762519564112f6b4015965247e4d77a85cdf6e9ab3496f19a1f1e3e3daf4a851968ba4161b9d0986c4627ea1aba0491bdcdb93994b439574ecbbd860cb9f773aed29131ec569d379a7ec247740ad47b24b794c8048df5c9114817d10119a29f4b0bc9e0c0b7149336cc3fd0a51b0f19eb5679edbe5fcc0e4b40fec5e67b1c0be6c6378f324875ade1d719545c1c2a46fb19878a421c331d05902e7516fddb94549b704a56ea750b731b4ca437d0f2ae53b71e70c8a7861f0e598b90df9f9f13ef5d812e6a6812f360642abeba83672b48d80f58cce6e2c17ac294cb4d962fa1adfdffd8c04a10250156e8891812ae6216b70a70997e739282ae494b83889530d504bb51e8c35a2a6392165e22635130549f76030bd03d6aea791c5cbd082f8c3a500b3dcc261565240cd662e3edac899f19c8c257cc3bae5378c8c02d024141951587c1e1d31c7d26be1ab7a713860a6b55f512948f819095ee74e74041cdbd8a7fcbeb79de6e87b60cf561ab714bfc9fcd2d6b4c4533406ef322bd16a77e44edecdd4d929fba6a75e847b6530eb28dc9e0807a93e97bf13c420b615833f66153d1b073343ca288c5e784c0e809626b00bc7377842f4a439ca1e86352fd318c05b00655613d48f0344f1e5e3572452c1966690734ab7866dd04b5daad0467914eb0861b185074f3da37de226a1e812b702aae528219f989d802e58807efc86ee437fbd77c0884a3e8d494e5c4a5b4d4fa8066819e368c85f3ee093399686e8f5b1d0dce87a5991121b79f65b756167e98537d2d39bee119aa401b0a38a3763b037fd538b7ebd8ca4d5c088726b7f3a69214febd047b022aa361c2d275137cde6dbceb5a23c4fac2a52c40bccb17bb528a8169762010d008a6d54a3310f5f764655a0e8e241dde9f8695de3c771a393c11a6257101cbf60835336e546f4a8161605b116cd131211670ff89806c2dae1b19e799b4012906b3d1dcb986da8ba8ad76c99c342e99c3800fdb728d7e62161de37e9ec4b42e4c9431321504da517e2cf351f69b50a959593df75812f7d84a63abd53bc9374c6d798308acf41f45b3d6c7e074043df7246da424a61c59f99d1b2503a7c37f022893fc7365738564b8a3327baed1e9b02aecea1dadc3b70094b6676a76d9b5696614d4b583ecfce6f7c47b982c3d7749e4e27092c9331de7058cf30def6eb72b7e5a7997a78b10bce7c9ab4e65e6815ea566bdbac0e536c644d07de4c0f62a612fe43bc288fec4faa3f6a396be359d3676f4157d372e21bd7f967d2d1d655b5fcb31184f560c3fb85bce51996706441e491cc750ea1668f655edb7556da6fc52c2b604e4e7cac139ea399ae4d3139370b0bdc0c73e65f72587487aa335e97a61d9317331988834fda60409c0cb30636e98c27c79e868128ddf480c73cb8985cb9b969c4959b145ee399d345c496f06dad5326108c995fe81b1b3923a57f933873bc00f8d88f91a8b86a3cb2b580901c8f35ce21ad19ae6ca90d2099b83e27c621607f19ff85ac71e92e366ee868f2a295d404bb2d7ed0a7d1167ee2aebae5671d3bce4551bd023e555eac4eee56c773bce662f0d7d6c31c491e14911d0041d0de49854c6ed594da4569fee8ab3479bc372509cda283f55db793c4920c3f8f47e50203530876fd197f982165366d551342a198d21d67dc3325eeee24f566c814749ec7e8923602ae4d4c2aaa2af916bf71568e244a0b3e17c8b75ba035bf324637957920afa4e5bef8aeca388325906580160c7516e10a26d39b8aa2e31cdfc5a77cef5ebce58b294ee3fa31ee09dbba7e10b9626c9c5def3095385ce104b990d8ea60f1b8ea320a72e287d2f6f8592f6074a9c821a065b31a8692169f00c374d5c248ff71facec65f684230037d38cd6bc54ff4ab1ef3312813db9a1b7bedb97a3e049f8a6f733be53d948622e28a67bdf78e18b7274cac1007bee6bb2656e9fcfcbd9948102d0e967c45df8e3bab547faceb6018aa45ae25bbd0a646468b102d746051fc724254d9ff5d4755e3b42d961c0b3ff63a556d724ec9005c21d00cf8fa3b035ace739abfc093d4736d8ca27ad06a63f6e59276eb552a76a98d9f29adc512b6b4264ad85732f0c7939f8299a578ed5c9391b0cda85081ac0ee8eb9d18919af1d5eadc9fe3c8b51113576ec45763e1ee002364f0881a59511c4dcf07e5de5f07df08bfec92da43758e1a4bb4aca4e6d4d8086c9a8f0a8ccb218e9e76c287b7b350b4f030235b129ed9a547bd00fd99e78603139ccad02f7ee8abd9e286c599e58fbf7de6dafb5990311bd98b0ca04e9128ea578e471e6139f5b62b0e13cee0569848cff5064cca74675b42d62fcb1e6ab2f67cd61bb7160e0db601dcc4fec6eae5c52c2edc5c1ab91f48e920e4223f9dd0dd2a237b58e1fbf23b5ac15954615cecf878aacc2e9db76713959cf36beb02da1deabca8d451b0d4b53e5afc002cd9399bcfe7d0ea4dd5ab2349d65ea782c53aa974027c2bc50cf722e7779bb8cbe5d380bb3065c9b5b80963fc3e3ea173b869a21e027ec1edaa87db7bd3531f5c841412c1a24cb2c4744a22fd405e6402a9030d2088a3ee8a8924c060734a15c59679cdb7553949331ff0c1e41e9cdefcdea45adbc3dbbdfe05bbb96aef39e05c46cd013c5270c5121d88c45648033027f671edaebe7c03483aa4eaaca2756da1f78b5af4ca70cef158225ee59b72bd8701f70e0bea7ba85369753ac018a878ba905571cccc3e5de7297b46736d9204f36209e9064442a7e63634fcf2635"}}, @algo_comp={0xd8, 0x3, {{'lzs\x00'}, 0x480, "f610fdf04ee8c9308b8e77d288439a488b27b0548edbe0d9289a1053323072c7138eeb3effc7019be07e76045738f49f593b180841c3633675acef98f377d0e4df1c9731ae0bb407d93a6e8c22028fe3d8f3eda11d9e960f52879b4ce86dd4cddd312966118048de6b3bd834379b689ad0767296e01e95cab05611ac6cf5de577bba4a61e18b76a05fc277259383a9b5"}}, @replay_val={0x10, 0xa, {0x70bd29, 0x70bd2d, 0x99}}, @algo_aead={0x119, 0x12, {{'generic-gcm-aesni\x00'}, 0x668, 0xa0, "a162e5b57cc3c266237f6ff21da3188bf78d654e09f49476c4289ffe7e573c50d8a12d6c0d5a8133a70e7b6e74e3f359e373d0ebcf7d10632503093790e87ac6ddcdfc55538fa333bea832177cfd14f9c4817420e87ff13ad89eaa454d2402dc249c4cb098aa6c7a93e0561543ebac58cef7c9420843d5da81bb8399fdd48384efcc195fe4cdebccec2461a9fbe1641be7a9fcd056717998a5cda5c51908996d3c575563b8ca9d20503d5ba98c3ba6c1cf631357f766451138c8edc6189e5a234d37b26566f89f6e086bcdf499"}}, @etimer_thresh={0x8, 0xc, 0xffff61e8}]}, 0x23b0}}, 0x0) 00:37:37 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xde9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x0, 0x3, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda6, 0x4) sendmsg$NL80211_CMD_GET_POWER_SAVE(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x20, 0x0, 0x10, 0x70bd2d, 0x25dfdbfd, {{}, {@void, @val={0xc, 0x99, {0x8, 0x16}}}}, ["", "", "", "", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x8000) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) writev(r0, &(0x7f0000000780)=[{&(0x7f0000000100)="dff548771d77ce8786aca76dda6fb054ab8ea73799d7293eda90ba41a2db81fab55b5415692300a8e64bca2f60e1717f85f06a6bbca90f392b04f34940db7ffccc33ed6ea82296de9683c9e360cd1c477304bd8f9bd74d44a4c7d1c7e625a86cd54b72c5745f475a772b84977a6b05381dbe6259bc510f0f70c3e9946a78c7b5a19e97447799d930f9", 0x89}, {&(0x7f00000001c0)="96431fb1cb119741590ad657dc5e5ce3e5fe9f1f639e6a18bc7b6c1d0b424eb306f34cf2429c62c0fdefbae36740a7169721af852826d7f14b6cae8af86507ff78a1dda991aea5952f43e7e0146a3c035f0113d617240e8940c60cdf3400193bbe3a0c0b1eae5799db27b4ee9c13475210defa4dac9d784e0c89135b82b321f8e43d7a5db9ab1bfd319f472a", 0x8c}, {&(0x7f0000001340)="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", 0x1b9}], 0x3) sendto$inet(r0, &(0x7f00000012c0)="1a268a927f1f6588b967480241ba78600453f65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) bind(r0, 0x0, 0x0) socketpair(0x1a, 0x0, 0x7e, 0x0) syz_mount_image$msdos(0x0, &(0x7f00000002c0)='./bus\x00', 0xc6, 0x3, &(0x7f0000000a00)=[{&(0x7f00000007c0), 0x0, 0x1}, {&(0x7f0000000300)="761e44668536a92f85", 0x9, 0x800}, {0x0}], 0x0, &(0x7f0000000ac0)={[{@dots}], [{@smackfsfloor={'smackfsfloor', 0x3d, '\x00'}}, {@smackfshat={'smackfshat', 0x3d, 'NETMAP\x00'}}, {@hash}, {@uid_eq}, {@uid_lt={'uid<', 0xee00}}]}) 00:37:37 executing program 3: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_io_uring_setup(0x1811, &(0x7f0000000000)={0x0, 0x103b, 0x2a}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 00:37:37 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000240), 0x4) 00:37:37 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)={0x44, 0x1, 0x2, 0x401, 0x0, 0x0, {0x2}, [@CTA_EXPECT_MASTER={0x30, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @empty}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}]}]}, 0x44}}, 0x0) 00:37:37 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='pagemap\x00') pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x0) syz_io_uring_setup(0x1cb6, &(0x7f0000000100), &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ff9000/0x4000)=nil, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='pagemap\x00') pread64(r1, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 00:37:37 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) select(0x40, &(0x7f0000001140), &(0x7f0000000040)={0x8}, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r1, 0x0) ioctl$TCXONC(r0, 0x540a, 0x1) 00:37:37 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x101}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x7}, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ppoll(&(0x7f0000000000)=[{}, {r2, 0xf123}], 0x2, &(0x7f0000000080)={0x77359400}, 0x0, 0x0) 00:37:37 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800002, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x1031fe, 0x0) pread64(r1, &(0x7f0000000040)=""/203, 0xcb, 0x400000000) 00:37:37 executing program 0: unshare(0x8000400) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000003440), 0x0, 0x0) signalfd(r0, &(0x7f0000000000), 0x8) 00:37:37 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x66, &(0x7f00000005c0)="c4c691019919da078a0098d1e0a593b040f762910000ee0d6333b5cacd893169b618322ff6602020511253508b728c2a46e1bc3c0e29b9ab9b7136283e350808ffdb2dbea791095cbc049a7a2e0e16efdca8f75356410b363de4fb357baa17dacdcfac32957d"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd", 0x44}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x40) [ 323.279090][T17704] loop2: detected capacity change from 0 to 8 00:37:37 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x0) mmap(&(0x7f0000545000/0x1000)=nil, 0x1d290000, 0x0, 0x828624fe048322d2, r0, 0x0) 00:37:37 executing program 5: r0 = open(&(0x7f0000000180)='./bus\x00', 0x1e3542, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 00:37:38 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xde9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x0, 0x3, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda6, 0x4) sendmsg$NL80211_CMD_GET_POWER_SAVE(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x20, 0x0, 0x10, 0x70bd2d, 0x25dfdbfd, {{}, {@void, @val={0xc, 0x99, {0x8, 0x16}}}}, ["", "", "", "", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x8000) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) writev(r0, &(0x7f0000000780)=[{&(0x7f0000000100)="dff548771d77ce8786aca76dda6fb054ab8ea73799d7293eda90ba41a2db81fab55b5415692300a8e64bca2f60e1717f85f06a6bbca90f392b04f34940db7ffccc33ed6ea82296de9683c9e360cd1c477304bd8f9bd74d44a4c7d1c7e625a86cd54b72c5745f475a772b84977a6b05381dbe6259bc510f0f70c3e9946a78c7b5a19e97447799d930f9", 0x89}, {&(0x7f00000001c0)="96431fb1cb119741590ad657dc5e5ce3e5fe9f1f639e6a18bc7b6c1d0b424eb306f34cf2429c62c0fdefbae36740a7169721af852826d7f14b6cae8af86507ff78a1dda991aea5952f43e7e0146a3c035f0113d617240e8940c60cdf3400193bbe3a0c0b1eae5799db27b4ee9c13475210defa4dac9d784e0c89135b82b321f8e43d7a5db9ab1bfd319f472a", 0x8c}, {&(0x7f0000001340)="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", 0x1b9}], 0x3) sendto$inet(r0, &(0x7f00000012c0)="1a268a927f1f6588b967480241ba78600453f65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) bind(r0, 0x0, 0x0) socketpair(0x1a, 0x0, 0x7e, 0x0) syz_mount_image$msdos(0x0, &(0x7f00000002c0)='./bus\x00', 0xc6, 0x3, &(0x7f0000000a00)=[{&(0x7f00000007c0), 0x0, 0x1}, {&(0x7f0000000300)="761e44668536a92f85", 0x9, 0x800}, {0x0}], 0x0, &(0x7f0000000ac0)={[{@dots}], [{@smackfsfloor={'smackfsfloor', 0x3d, '\x00'}}, {@smackfshat={'smackfshat', 0x3d, 'NETMAP\x00'}}, {@hash}, {@uid_eq}, {@uid_lt={'uid<', 0xee00}}]}) 00:37:38 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x40505330, &(0x7f00000000c0)={0x3fffffe}) 00:37:38 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x66, &(0x7f00000005c0)="c4c691019919da078a0098d1e0a593b040f762910000ee0d6333b5cacd893169b618322ff6602020511253508b728c2a46e1bc3c0e29b9ab9b7136283e350808ffdb2dbea791095cbc049a7a2e0e16efdca8f75356410b363de4fb357baa17dacdcfac32957d"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd", 0x44}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x40) 00:37:38 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='smaps\x00') shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x5000) pread64(r0, &(0x7f00000001c0)=""/102400, 0x19000, 0x20da9) 00:37:38 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/bus/input/devices\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000dc0)=""/4096, 0x1000}], 0x1, 0x0, 0x0) [ 323.863990][T17738] loop2: detected capacity change from 0 to 8 00:37:38 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x66, &(0x7f00000005c0)="c4c691019919da078a0098d1e0a593b040f762910000ee0d6333b5cacd893169b618322ff6602020511253508b728c2a46e1bc3c0e29b9ab9b7136283e350808ffdb2dbea791095cbc049a7a2e0e16efdca8f75356410b363de4fb357baa17dacdcfac32957d"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd", 0x44}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x40) [ 324.075821][T17768] loop2: detected capacity change from 0 to 8 00:37:38 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.events\x00', 0x26e1, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001580)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="180000000000000001000000010000000600000003"], 0x18}, 0x0) recvmsg(r1, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/67, 0x43}, 0x0) 00:37:38 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xde9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x0, 0x3, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda6, 0x4) sendmsg$NL80211_CMD_GET_POWER_SAVE(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x20, 0x0, 0x10, 0x70bd2d, 0x25dfdbfd, {{}, {@void, @val={0xc, 0x99, {0x8, 0x16}}}}, ["", "", "", "", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x8000) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) writev(r0, &(0x7f0000000780)=[{&(0x7f0000000100)="dff548771d77ce8786aca76dda6fb054ab8ea73799d7293eda90ba41a2db81fab55b5415692300a8e64bca2f60e1717f85f06a6bbca90f392b04f34940db7ffccc33ed6ea82296de9683c9e360cd1c477304bd8f9bd74d44a4c7d1c7e625a86cd54b72c5745f475a772b84977a6b05381dbe6259bc510f0f70c3e9946a78c7b5a19e97447799d930f9", 0x89}, {&(0x7f00000001c0)="96431fb1cb119741590ad657dc5e5ce3e5fe9f1f639e6a18bc7b6c1d0b424eb306f34cf2429c62c0fdefbae36740a7169721af852826d7f14b6cae8af86507ff78a1dda991aea5952f43e7e0146a3c035f0113d617240e8940c60cdf3400193bbe3a0c0b1eae5799db27b4ee9c13475210defa4dac9d784e0c89135b82b321f8e43d7a5db9ab1bfd319f472a", 0x8c}, {&(0x7f0000001340)="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", 0x1b9}], 0x3) sendto$inet(r0, &(0x7f00000012c0)="1a268a927f1f6588b967480241ba78600453f65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) bind(r0, 0x0, 0x0) socketpair(0x1a, 0x0, 0x7e, 0x0) syz_mount_image$msdos(0x0, &(0x7f00000002c0)='./bus\x00', 0xc6, 0x3, &(0x7f0000000a00)=[{&(0x7f00000007c0), 0x0, 0x1}, {&(0x7f0000000300)="761e44668536a92f85", 0x9, 0x800}, {0x0}], 0x0, &(0x7f0000000ac0)={[{@dots}], [{@smackfsfloor={'smackfsfloor', 0x3d, '\x00'}}, {@smackfshat={'smackfshat', 0x3d, 'NETMAP\x00'}}, {@hash}, {@uid_eq}, {@uid_lt={'uid<', 0xee00}}]}) 00:37:38 executing program 5: setgroups(0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x3b, &(0x7f0000000000), 0x970000) 00:37:38 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000140), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={0x40, r1, 0x401, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_DOMAIN={0xe, 0x1, 'NLBL_MGMT\x00'}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @empty}]}, 0x40}}, 0x0) 00:37:38 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x66, &(0x7f00000005c0)="c4c691019919da078a0098d1e0a593b040f762910000ee0d6333b5cacd893169b618322ff6602020511253508b728c2a46e1bc3c0e29b9ab9b7136283e350808ffdb2dbea791095cbc049a7a2e0e16efdca8f75356410b363de4fb357baa17dacdcfac32957d"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd", 0x44}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x40) 00:37:38 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x7, &(0x7f0000000200)=[{&(0x7f0000000080)="200000008000000006000000600000000f000000000000000100000001000000004000000040000020000000d2f4655fd2f4655f0100ffff53ef010001000000d0f4655f000000000000000001000000000000000b0000008000000008000000524700006201", 0x66, 0x400}, {&(0x7f0000010200)="01000000000005000c", 0x9, 0x560}, {&(0x7f0000010400)="020000001200000022", 0x9, 0x800}, {&(0x7f0000011600)="504d4d00504d4dff", 0x8, 0x6000}, {&(0x7f0000011700)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x6800}, {&(0x7f0000012e00)="ed41000000080000d0f4655fd2f4655fd2f4655f000000000000040004", 0x1d, 0x11080}, {&(0x7f0000012f00)="8081000000180000d0f4655fd0f4655fd0f4655f00000000000001000c00000010000800000000000af30100040000000000000000000000030000000d", 0x3d, 0x11100}], 0x0, &(0x7f0000000600)={[{@jqfmt_vfsv1}]}) [ 324.347368][T17796] loop4: detected capacity change from 0 to 8 [ 324.640719][ T25] kauditd_printk_skb: 81911 callbacks suppressed [ 324.640730][ T25] audit: type=1326 audit(1619743058.921:1654426): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 324.675272][ T25] audit: type=1326 audit(1619743058.931:1654427): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 324.699982][ T25] audit: type=1326 audit(1619743058.931:1654428): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 324.725287][ T25] audit: type=1326 audit(1619743058.931:1654429): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 324.750521][ T25] audit: type=1326 audit(1619743058.931:1654430): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 324.774927][ T25] audit: type=1326 audit(1619743058.931:1654431): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 324.799505][ T25] audit: type=1326 audit(1619743058.931:1654432): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 324.825583][ T25] audit: type=1326 audit(1619743058.931:1654433): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 324.850375][ T25] audit: type=1326 audit(1619743058.931:1654434): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 00:37:39 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xde9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x0, 0x3, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda6, 0x4) sendmsg$NL80211_CMD_GET_POWER_SAVE(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x20, 0x0, 0x10, 0x70bd2d, 0x25dfdbfd, {{}, {@void, @val={0xc, 0x99, {0x8, 0x16}}}}, ["", "", "", "", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x8000) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) writev(r0, &(0x7f0000000780)=[{&(0x7f0000000100)="dff548771d77ce8786aca76dda6fb054ab8ea73799d7293eda90ba41a2db81fab55b5415692300a8e64bca2f60e1717f85f06a6bbca90f392b04f34940db7ffccc33ed6ea82296de9683c9e360cd1c477304bd8f9bd74d44a4c7d1c7e625a86cd54b72c5745f475a772b84977a6b05381dbe6259bc510f0f70c3e9946a78c7b5a19e97447799d930f9", 0x89}, {&(0x7f00000001c0)="96431fb1cb119741590ad657dc5e5ce3e5fe9f1f639e6a18bc7b6c1d0b424eb306f34cf2429c62c0fdefbae36740a7169721af852826d7f14b6cae8af86507ff78a1dda991aea5952f43e7e0146a3c035f0113d617240e8940c60cdf3400193bbe3a0c0b1eae5799db27b4ee9c13475210defa4dac9d784e0c89135b82b321f8e43d7a5db9ab1bfd319f472a", 0x8c}, {&(0x7f0000001340)="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", 0x1b9}], 0x3) sendto$inet(r0, &(0x7f00000012c0)="1a268a927f1f6588b967480241ba78600453f65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) bind(r0, 0x0, 0x0) socketpair(0x1a, 0x0, 0x7e, 0x0) syz_mount_image$msdos(0x0, &(0x7f00000002c0)='./bus\x00', 0xc6, 0x3, &(0x7f0000000a00)=[{&(0x7f00000007c0), 0x0, 0x1}, {&(0x7f0000000300)="761e44668536a92f85", 0x9, 0x800}, {0x0}], 0x0, &(0x7f0000000ac0)={[{@dots}], [{@smackfsfloor={'smackfsfloor', 0x3d, '\x00'}}, {@smackfshat={'smackfshat', 0x3d, 'NETMAP\x00'}}, {@hash}, {@uid_eq}, {@uid_lt={'uid<', 0xee00}}]}) 00:37:39 executing program 3: set_mempolicy(0x1, 0x0, 0x0) msgget$private(0x0, 0x0) 00:37:39 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) poll(&(0x7f0000000000)=[{}, {}], 0x32, 0x0) 00:37:39 executing program 1: r0 = signalfd(0xffffffffffffffff, &(0x7f0000000140), 0x8) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) read(r0, &(0x7f00000002c0)=""/376, 0x178) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x43c00) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x20) inotify_add_watch(r1, &(0x7f0000000180)='./control\x00', 0xa7000be0) open(&(0x7f0000000080)='./control\x00', 0x0, 0x0) 00:37:39 executing program 0: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x1c, 0x0, &(0x7f0000000280)) [ 324.875629][ T25] audit: type=1326 audit(1619743058.931:1654435): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 00:37:39 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sysvipc/msg\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001240)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x401, 0x0) 00:37:39 executing program 5: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r1) r2 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0xc, &(0x7f0000000040)={0x7ff}, 0x17f) sendmsg$NL80211_CMD_JOIN_MESH(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) write(0xffffffffffffffff, &(0x7f0000000180)="1c0000004a005f0214f9f424000904000a", 0xfffffffffffffc70) splice(r0, 0x0, r1, 0x0, 0xfffd, 0x0) 00:37:39 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$SO_TIMESTAMP(r0, 0x29, 0x13, 0x0, 0x0) 00:37:39 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sysvipc/msg\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001240)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x401, 0x0) 00:37:39 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xde9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x0, 0x3, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda6, 0x4) sendmsg$NL80211_CMD_GET_POWER_SAVE(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x20, 0x0, 0x10, 0x70bd2d, 0x25dfdbfd, {{}, {@void, @val={0xc, 0x99, {0x8, 0x16}}}}, ["", "", "", "", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x8000) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) writev(r0, &(0x7f0000000780)=[{&(0x7f0000000100)="dff548771d77ce8786aca76dda6fb054ab8ea73799d7293eda90ba41a2db81fab55b5415692300a8e64bca2f60e1717f85f06a6bbca90f392b04f34940db7ffccc33ed6ea82296de9683c9e360cd1c477304bd8f9bd74d44a4c7d1c7e625a86cd54b72c5745f475a772b84977a6b05381dbe6259bc510f0f70c3e9946a78c7b5a19e97447799d930f9", 0x89}, {&(0x7f00000001c0)="96431fb1cb119741590ad657dc5e5ce3e5fe9f1f639e6a18bc7b6c1d0b424eb306f34cf2429c62c0fdefbae36740a7169721af852826d7f14b6cae8af86507ff78a1dda991aea5952f43e7e0146a3c035f0113d617240e8940c60cdf3400193bbe3a0c0b1eae5799db27b4ee9c13475210defa4dac9d784e0c89135b82b321f8e43d7a5db9ab1bfd319f472a", 0x8c}, {&(0x7f0000001340)="f15c93cb35c215fe339d1e9060c5b23e77cb58a87329a00288504db389cc6e395885fa906ac30eeae99fa388c31b5717e641e1586a90961b5f99b26c939d944f6cb1cf6817b7e51402a8459f9db642e97d3c05db56250a665d3ff188eb47e5b036d508aa5a5796fb8806b6a41487e0bfc3df087c18269bd7d2f477104c5d5db497ceaf3e1b11a5d63a2b7035dc69fa701f3b46fe701880800a7d38dccd4b3e8014aa15c96968359533ce2c5ffdd5f0d3297018bd7c025150940cdead92eb1e6bc6ba45eecf067b32425b6000b2f376ef9172426ae7fa97e5a84ef4dc540bbf5dd458ffcb75724135bd32fa04db6d6a75aedda7ab6e8501fc94e209dc3b2525ae24c954255d3247ca9c1b9525ce68179a52a87333aa2b0a8c1baa6ba6160c6d2018e67bac5402d0d89c5f798b8d1a87b0dc3306f546c61724530d9f4b6f0ee68677c7b261de5afa02d708a8ec979791de8f4831cc354ba453bc253e2435207f25494a594d4e5be39902358d362cb318ad965b7e7480a5ca5b6fe74e101c400c77392ee4419ad788f494230487811046f21f0f9665dfbaa9e94ed305a02e3fa47039e67dde19f89c8f1741aad752cdfe458ddf54e8fc10ff79b5", 0x1b9}], 0x3) sendto$inet(r0, &(0x7f00000012c0)="1a268a927f1f6588b967480241ba78600453f65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) bind(r0, 0x0, 0x0) socketpair(0x1a, 0x0, 0x7e, 0x0) syz_mount_image$msdos(0x0, &(0x7f00000002c0)='./bus\x00', 0xc6, 0x3, &(0x7f0000000a00)=[{&(0x7f00000007c0), 0x0, 0x1}, {&(0x7f0000000300)="761e44668536a92f85", 0x9, 0x800}, {0x0}], 0x0, &(0x7f0000000ac0)={[{@dots}], [{@smackfsfloor={'smackfsfloor', 0x3d, '\x00'}}, {@smackfshat={'smackfshat', 0x3d, 'NETMAP\x00'}}, {@hash}, {@uid_eq}, {@uid_lt={'uid<', 0xee00}}]}) 00:37:39 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000240), 0x4) 00:37:39 executing program 1: r0 = syz_io_uring_setup(0x6e83, &(0x7f0000000080)={0x0, 0x0, 0x1}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f00006d6000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000300)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000100)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x3edb, 0x0, 0x0, 0x0, 0x0) [ 325.158814][T17833] loop2: detected capacity change from 0 to 8 [ 325.370167][T17850] loop4: detected capacity change from 0 to 8 00:37:40 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xde9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x0, 0x3, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda6, 0x4) sendmsg$NL80211_CMD_GET_POWER_SAVE(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x20, 0x0, 0x10, 0x70bd2d, 0x25dfdbfd, {{}, {@void, @val={0xc, 0x99, {0x8, 0x16}}}}, ["", "", "", "", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x8000) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) writev(r0, &(0x7f0000000780)=[{&(0x7f0000000100)="dff548771d77ce8786aca76dda6fb054ab8ea73799d7293eda90ba41a2db81fab55b5415692300a8e64bca2f60e1717f85f06a6bbca90f392b04f34940db7ffccc33ed6ea82296de9683c9e360cd1c477304bd8f9bd74d44a4c7d1c7e625a86cd54b72c5745f475a772b84977a6b05381dbe6259bc510f0f70c3e9946a78c7b5a19e97447799d930f9", 0x89}, {&(0x7f00000001c0)="96431fb1cb119741590ad657dc5e5ce3e5fe9f1f639e6a18bc7b6c1d0b424eb306f34cf2429c62c0fdefbae36740a7169721af852826d7f14b6cae8af86507ff78a1dda991aea5952f43e7e0146a3c035f0113d617240e8940c60cdf3400193bbe3a0c0b1eae5799db27b4ee9c13475210defa4dac9d784e0c89135b82b321f8e43d7a5db9ab1bfd319f472a", 0x8c}, {&(0x7f0000001340)="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", 0x1b9}], 0x3) sendto$inet(r0, &(0x7f00000012c0)="1a268a927f1f6588b967480241ba78600453f65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) bind(r0, 0x0, 0x0) socketpair(0x1a, 0x0, 0x7e, 0x0) syz_mount_image$msdos(0x0, &(0x7f00000002c0)='./bus\x00', 0xc6, 0x3, &(0x7f0000000a00)=[{&(0x7f00000007c0), 0x0, 0x1}, {&(0x7f0000000300)="761e44668536a92f85", 0x9, 0x800}, {0x0}], 0x0, &(0x7f0000000ac0)={[{@dots}], [{@smackfsfloor={'smackfsfloor', 0x3d, '\x00'}}, {@smackfshat={'smackfshat', 0x3d, 'NETMAP\x00'}}, {@hash}, {@uid_eq}, {@uid_lt={'uid<', 0xee00}}]}) 00:37:40 executing program 5: open(&(0x7f0000000200)='./file0\x00', 0x4008040, 0x0) setxattr$security_capability(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'security.', ']-\xec\'%*/\x00'}, 0x0, 0x0) 00:37:40 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="5500000018007f5f00fe01b2a4a28093020600feff000001080b00000a0007003500281e14000000090005407fdeafcb634803535631a1a314ba790795cc8941f1e1fe2e0f6ffcd62a77fce42180ef0050ecc427fa", 0x55}], 0x1}, 0x0) 00:37:40 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sysvipc/msg\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001240)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x401, 0x0) 00:37:40 executing program 0: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000280)={0x6}, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)={0x14, 0x1a, 0xa01, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) 00:37:40 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xde9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x0, 0x3, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda6, 0x4) sendmsg$NL80211_CMD_GET_POWER_SAVE(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x20, 0x0, 0x10, 0x70bd2d, 0x25dfdbfd, {{}, {@void, @val={0xc, 0x99, {0x8, 0x16}}}}, ["", "", "", "", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x8000) open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) writev(r0, &(0x7f0000000780)=[{&(0x7f0000000100)="dff548771d77ce8786aca76dda6fb054ab8ea73799d7293eda90ba41a2db81fab55b5415692300a8e64bca2f60e1717f85f06a6bbca90f392b04f34940db7ffccc33ed6ea82296de9683c9e360cd1c477304bd8f9bd74d44a4c7d1c7e625a86cd54b72c5745f475a772b84977a6b05381dbe6259bc510f0f70c3e9946a78c7b5a19e97447799d930f9", 0x89}, {&(0x7f00000001c0)="96431fb1cb119741590ad657dc5e5ce3e5fe9f1f639e6a18bc7b6c1d0b424eb306f34cf2429c62c0fdefbae36740a7169721af852826d7f14b6cae8af86507ff78a1dda991aea5952f43e7e0146a3c035f0113d617240e8940c60cdf3400193bbe3a0c0b1eae5799db27b4ee9c13475210defa4dac9d784e0c89135b82b321f8e43d7a5db9ab1bfd319f472a", 0x8c}, {&(0x7f0000001340)="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", 0x1b9}], 0x3) sendto$inet(r0, &(0x7f00000012c0)="1a268a927f1f6588b967480241ba78600453f65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) bind(r0, 0x0, 0x0) socketpair(0x1a, 0x0, 0x7e, 0x0) syz_mount_image$msdos(0x0, &(0x7f00000002c0)='./bus\x00', 0xc6, 0x3, &(0x7f0000000a00)=[{&(0x7f00000007c0), 0x0, 0x1}, {&(0x7f0000000300)="761e44668536a92f85", 0x9, 0x800}, {0x0}], 0x0, &(0x7f0000000ac0)={[{@dots}], [{@smackfsfloor={'smackfsfloor', 0x3d, '\x00'}}, {@smackfshat={'smackfshat', 0x3d, 'NETMAP\x00'}}, {@hash}, {@uid_eq}, {@uid_lt={'uid<', 0xee00}}]}) 00:37:40 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sysvipc/msg\x00', 0x0, 0x0) preadv(r0, &(0x7f0000001240)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x401, 0x0) 00:37:40 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = dup(r1) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200), 0x0, &(0x7f0000000040)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@dfltuid}, {@dfltuid={'dfltuid', 0x3d, 0xffffffffffffffff}}, {@mmap}], [], 0x6b}}) [ 325.973928][T17866] netlink: 'syz-executor.1': attribute type 7 has an invalid length. [ 325.982440][T17866] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 325.990572][T17866] netlink: 33 bytes leftover after parsing attributes in process `syz-executor.1'. 00:37:40 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_ABORT_SCAN(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r1, 0x1, 0x0, 0x0, {{0x2}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) [ 326.064160][T17877] loop4: detected capacity change from 0 to 8 00:37:40 executing program 0: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_SENDMSG={0x9, 0x2, 0x0, r3, 0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x170}, 0x0, 0x48040}, 0x8) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4, 0x0, @fd=r3}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x0, 0x0, 0x0) 00:37:40 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="5500000018007f5f00fe01b2a4a28093020600feff000001080b00000a0007003500281e14000000090005407fdeafcb634803535631a1a314ba790795cc8941f1e1fe2e0f6ffcd62a77fce42180ef0050ecc427fa", 0x55}], 0x1}, 0x0) 00:37:40 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setuid(r1) clock_adjtime(0x0, &(0x7f0000000000)={0x8001}) [ 326.215771][T17897] netlink: 'syz-executor.1': attribute type 7 has an invalid length. [ 326.223958][T17897] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 326.232046][T17897] netlink: 33 bytes leftover after parsing attributes in process `syz-executor.1'. [ 326.280402][T17902] loop2: detected capacity change from 0 to 8 00:37:40 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCGICOUNT(r0, 0x4b48, 0x0) 00:37:40 executing program 0: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_SENDMSG={0x9, 0x2, 0x0, r3, 0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x170}, 0x0, 0x48040}, 0x8) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4, 0x0, @fd=r3}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x0, 0x0, 0x0) 00:37:40 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f0000001240)=[{&(0x7f0000000000)="8e0ee8678a081b45", 0x8}], 0x1) 00:37:40 executing program 2: setregid(0x0, 0xee00) setfsgid(0x0) 00:37:40 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="5500000018007f5f00fe01b2a4a28093020600feff000001080b00000a0007003500281e14000000090005407fdeafcb634803535631a1a314ba790795cc8941f1e1fe2e0f6ffcd62a77fce42180ef0050ecc427fa", 0x55}], 0x1}, 0x0) [ 326.501614][T17923] netlink: 'syz-executor.1': attribute type 7 has an invalid length. [ 326.509899][T17923] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 326.517994][T17923] netlink: 33 bytes leftover after parsing attributes in process `syz-executor.1'. 00:37:41 executing program 2: timer_create(0xe9783adeb26b74b8, 0x0, &(0x7f0000000080)) 00:37:41 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r0, &(0x7f0000000180)=[{&(0x7f0000000380)=""/155, 0x9b}], 0x1, 0x0, 0x0) 00:37:41 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7fffff7a}]}) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @raw8={"53c444a899ac8feac25a3063"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x40) 00:37:41 executing program 0: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_SENDMSG={0x9, 0x2, 0x0, r3, 0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x170}, 0x0, 0x48040}, 0x8) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4, 0x0, @fd=r3}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x0, 0x0, 0x0) 00:37:41 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="5500000018007f5f00fe01b2a4a28093020600feff000001080b00000a0007003500281e14000000090005407fdeafcb634803535631a1a314ba790795cc8941f1e1fe2e0f6ffcd62a77fce42180ef0050ecc427fa", 0x55}], 0x1}, 0x0) 00:37:41 executing program 4: sched_setaffinity(0x0, 0x8, &(0x7f0000000100)=0x10001) unshare(0x2a000400) r0 = fork() fork() rt_sigqueueinfo(r0, 0x9, &(0x7f0000000140)={0x0, 0x0, 0x80000101}) wait4(0x0, 0x0, 0x0, 0x0) 00:37:41 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="66530700ae897094e785a124b5847bdf574b3164927eb5b126b097eaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26f45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4ff15f715134d82ce9c0952d644157684", 0x65}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) tkill(r0, 0x27) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 00:37:41 executing program 0: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000540)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000340)=@IORING_OP_SENDMSG={0x9, 0x2, 0x0, r3, 0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x170}, 0x0, 0x48040}, 0x8) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x4, 0x0, @fd=r3}, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x0, 0x0, 0x0) [ 326.818507][T17945] netlink: 'syz-executor.1': attribute type 7 has an invalid length. [ 326.826756][T17945] netlink: 'syz-executor.1': attribute type 5 has an invalid length. [ 326.834966][T17945] netlink: 33 bytes leftover after parsing attributes in process `syz-executor.1'. 00:37:41 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r0, &(0x7f0000000180)=[{&(0x7f0000000380)=""/155, 0x9b}], 0x1, 0x0, 0x0) 00:37:41 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xf5, &(0x7f0000000440)="c4c691019919da078a0098d1e0a593b040f7629100f06ee04fa4ea57ff22ea97be19af3dcba01419cd2386ad59157689c9c6a47312334c2a97ac2b7f0fb4aabebae8dc5dffbcd48a70502173d6efa56b60f48cf0c9d0989ecbbfc220bd2b39df9ad8d6b14910f4a869863009780dd6e673a02f7ed829932929af9dffb1fa2cd7328202ac55f4f5dbb8494120f79d5f60958691a8a3fcf561c33f46ab89803f47d97e04f7bf9cafb006ae29480408c8380cf060dd72462ccc5b7d195a113bc539df6591cd574a02d4d9b9f3ebce31bd7582018ded8ceb71e75417dabc45f9fa0503befdcd0874ae979bc9581d6a854d4dfb7ffaed09"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x34) 00:37:41 executing program 1: r0 = syz_io_uring_setup(0x76d0, &(0x7f0000000240), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000540), &(0x7f0000000100)) r1 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) ftruncate(r1, 0x80401) preadv(r1, &(0x7f0000000500)=[{&(0x7f0000000700)=""/90, 0x5a}], 0x1, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000040)=""/151, 0x97}, {&(0x7f00000001c0)=""/17, 0x11}, {&(0x7f00000003c0), 0xf0000}], 0x3) 00:37:41 executing program 0: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) lseek(r1, 0x7ffffa, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0x1a0) truncate(&(0x7f0000000040)='./bus\x00', 0x5e1) fallocate(r0, 0x0, 0x0, 0x80019c) writev(r1, &(0x7f0000000080)=[{&(0x7f0000000500)="95", 0x1}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) lseek(r0, 0x0, 0x3) 00:37:41 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="66530700ae897094e71b0fa1f147a8378f3657cdcf86db93aa6ed9cbc6a9e00b9e626aa995d690c8a2372286677850ab8e9b75839f0715a567dafe306f0818fd861f", 0x42}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x5) tkill(r1, 0x1e) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="02000000010004000000000002000100", @ANYRES32, @ANYBLOB="040004000000000008000400", @ANYRES32, @ANYBLOB="08000500", @ANYRES32, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0xee00, @ANYBLOB="01000000", @ANYRES32, @ANYBLOB="08000300", @ANYRES32, @ANYBLOB="08000500", @ANYRES32=0xee00, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=0xee01, @ANYBLOB="080004", @ANYRES32=0xee01], 0x7c, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) exit_group(0x0) 00:37:41 executing program 3: sendmsg$NL80211_CMD_FLUSH_PMKSA(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x70bd2b, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x6, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0xfeb1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000000c0)="80810000007f", 0xfc3b, 0x1600}], 0x81, &(0x7f0000000180)={[{@errors_remount}]}) 00:37:41 executing program 4: sched_setaffinity(0x0, 0x8, &(0x7f0000000100)=0x10001) unshare(0x2a000400) r0 = fork() fork() rt_sigqueueinfo(r0, 0x9, &(0x7f0000000140)={0x0, 0x0, 0x80000101}) wait4(0x0, 0x0, 0x0, 0x0) 00:37:41 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r0, &(0x7f0000000180)=[{&(0x7f0000000380)=""/155, 0x9b}], 0x1, 0x0, 0x0) 00:37:41 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="66530700ae897094e71b0fa1f147a8378f3657cdcf86db93aa6ed9cbc6a9e00b9e626aa995d690c8a2372286677850ab8e9b75839f0715a567dafe306f0818fd861f", 0x42}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x5) tkill(r1, 0x1e) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="02000000010004000000000002000100", @ANYRES32, @ANYBLOB="040004000000000008000400", @ANYRES32, @ANYBLOB="08000500", @ANYRES32, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0xee00, @ANYBLOB="01000000", @ANYRES32, @ANYBLOB="08000300", @ANYRES32, @ANYBLOB="08000500", @ANYRES32=0xee00, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=0xee01, @ANYBLOB="080004", @ANYRES32=0xee01], 0x7c, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) exit_group(0x0) 00:37:41 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuacct.stat\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x4030582a, &(0x7f0000000040)) write$cgroup_type(r1, &(0x7f0000000140), 0xffffff1f) 00:37:41 executing program 0: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) lseek(r1, 0x7ffffa, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0x1a0) truncate(&(0x7f0000000040)='./bus\x00', 0x5e1) fallocate(r0, 0x0, 0x0, 0x80019c) writev(r1, &(0x7f0000000080)=[{&(0x7f0000000500)="95", 0x1}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) lseek(r0, 0x0, 0x3) [ 327.131194][T17998] loop3: detected capacity change from 0 to 1051 00:37:41 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="66530700ae897094e71b0fa1f147a8378f3657cdcf86db93aa6ed9cbc6a9e00b9e626aa995d690c8a2372286677850ab8e9b75839f0715a567dafe306f0818fd861f", 0x42}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x5) tkill(r1, 0x1e) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="02000000010004000000000002000100", @ANYRES32, @ANYBLOB="040004000000000008000400", @ANYRES32, @ANYBLOB="08000500", @ANYRES32, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0xee00, @ANYBLOB="01000000", @ANYRES32, @ANYBLOB="08000300", @ANYRES32, @ANYBLOB="08000500", @ANYRES32=0xee00, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=0xee01, @ANYBLOB="080004", @ANYRES32=0xee01], 0x7c, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 327.214816][T17998] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 00:37:41 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/tcp6\x00') preadv(r0, &(0x7f0000000180)=[{&(0x7f0000000380)=""/155, 0x9b}], 0x1, 0x0, 0x0) 00:37:41 executing program 4: sched_setaffinity(0x0, 0x8, &(0x7f0000000100)=0x10001) unshare(0x2a000400) r0 = fork() fork() rt_sigqueueinfo(r0, 0x9, &(0x7f0000000140)={0x0, 0x0, 0x80000101}) wait4(0x0, 0x0, 0x0, 0x0) 00:37:41 executing program 0: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) lseek(r1, 0x7ffffa, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0x1a0) truncate(&(0x7f0000000040)='./bus\x00', 0x5e1) fallocate(r0, 0x0, 0x0, 0x80019c) writev(r1, &(0x7f0000000080)=[{&(0x7f0000000500)="95", 0x1}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) lseek(r0, 0x0, 0x3) [ 327.314035][T17998] EXT4-fs (loop3): orphan cleanup on readonly fs 00:37:41 executing program 4: sched_setaffinity(0x0, 0x8, &(0x7f0000000100)=0x10001) unshare(0x2a000400) r0 = fork() fork() rt_sigqueueinfo(r0, 0x9, &(0x7f0000000140)={0x0, 0x0, 0x80000101}) wait4(0x0, 0x0, 0x0, 0x0) 00:37:41 executing program 5: capset(&(0x7f0000000600)={0x20071026}, &(0x7f0000000640)) r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') setns(r0, 0x0) [ 327.377810][T17998] EXT4-fs error (device loop3): ext4_free_inode:282: comm syz-executor.3: reserved or nonexistent inode 3 00:37:41 executing program 0: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) lseek(r1, 0x7ffffa, 0x0) write$binfmt_elf64(r1, &(0x7f0000000280)=ANY=[], 0x1a0) truncate(&(0x7f0000000040)='./bus\x00', 0x5e1) fallocate(r0, 0x0, 0x0, 0x80019c) writev(r1, &(0x7f0000000080)=[{&(0x7f0000000500)="95", 0x1}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) lseek(r0, 0x0, 0x3) 00:37:41 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="66530700ae897094e71b0fa1f147a8378f3657cdcf86db93aa6ed9cbc6a9e00b9e626aa995d690c8a2372286677850ab8e9b75839f0715a567dafe306f0818fd861f", 0x42}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x5) tkill(r1, 0x1e) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="02000000010004000000000002000100", @ANYRES32, @ANYBLOB="040004000000000008000400", @ANYRES32, @ANYBLOB="08000500", @ANYRES32, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0xee00, @ANYBLOB="01000000", @ANYRES32, @ANYBLOB="08000300", @ANYRES32, @ANYBLOB="08000500", @ANYRES32=0xee00, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=0xee01, @ANYBLOB="080004", @ANYRES32=0xee01], 0x7c, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) exit_group(0x0) 00:37:41 executing program 5: capset(&(0x7f0000000600)={0x20071026}, &(0x7f0000000640)) r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') setns(r0, 0x0) 00:37:41 executing program 4: set_mempolicy(0x1, &(0x7f00000005c0)=0x1, 0x7ff) modify_ldt$write(0x1, &(0x7f0000000140)={0xfff}, 0x10) [ 327.490282][T17998] EXT4-fs (loop3): Remounting filesystem read-only [ 327.496950][T17998] EXT4-fs warning (device loop3): ext4_enable_quotas:6442: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 327.510882][T17998] EXT4-fs (loop3): Cannot turn on quotas: error -22 [ 327.517502][T17998] EXT4-fs (loop3): mounted filesystem without journal. Opts: errors=remount-ro,. Quota mode: writeback. 00:37:42 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = timerfd_create(0x8, 0x0) timerfd_settime(r1, 0x0, &(0x7f0000000140)={{}, {0x77359400}}, &(0x7f0000001280)) 00:37:42 executing program 3: sendmsg$NL80211_CMD_FLUSH_PMKSA(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x70bd2b, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x6, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0xfeb1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000000c0)="80810000007f", 0xfc3b, 0x1600}], 0x81, &(0x7f0000000180)={[{@errors_remount}]}) 00:37:42 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x2000}, 0x4) 00:37:42 executing program 2: r0 = socket(0x10, 0x3, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x9, &(0x7f0000000000)={0x8}, 0x4) 00:37:42 executing program 5: capset(&(0x7f0000000600)={0x20071026}, &(0x7f0000000640)) r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') setns(r0, 0x0) 00:37:42 executing program 0: request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)='-^%d\x00', 0xffffffffffffffff) socketpair(0xa, 0x3, 0x11, &(0x7f0000000000)) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/timer_list\x00', 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_P2P_DEVICE(r0, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="14000008", @ANYRES16=r1, @ANYBLOB="010000000000000000005a000000"], 0x14}}, 0x0) sendmsg$NL80211_CMD_STOP_P2P_DEVICE(0xffffffffffffffff, 0x0, 0x0) 00:37:42 executing program 4: r0 = gettid() r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000400)={0x0, 0x0, 0x0, 'queue0\x00'}) read(r1, &(0x7f0000000080)=""/238, 0xee) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000040)={0xa9}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000380)) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r1, 0xc08c5336, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue0\x00'}) tkill(r0, 0x7) 00:37:42 executing program 2: set_mempolicy(0x3, &(0x7f0000000140)=0x3ff, 0x6) getcwd(&(0x7f0000000000)=""/191, 0xbf) 00:37:42 executing program 5: capset(&(0x7f0000000600)={0x20071026}, &(0x7f0000000640)) r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') setns(r0, 0x0) [ 327.846491][T18070] loop3: detected capacity change from 0 to 1051 00:37:42 executing program 0: request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)='-^%d\x00', 0xffffffffffffffff) socketpair(0xa, 0x3, 0x11, &(0x7f0000000000)) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/timer_list\x00', 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_P2P_DEVICE(r0, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="14000008", @ANYRES16=r1, @ANYBLOB="010000000000000000005a000000"], 0x14}}, 0x0) sendmsg$NL80211_CMD_STOP_P2P_DEVICE(0xffffffffffffffff, 0x0, 0x0) [ 327.888636][T18070] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) 00:37:42 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000005c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7ffc0000}]}) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0) 00:37:42 executing program 2: r0 = epoll_create1(0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000180)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fc00000}]}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000040)) 00:37:42 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x8000000000006, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "eaffffff090000000000000000000000000053"}) write$binfmt_aout(r0, &(0x7f0000000080)=ANY=[], 0x35b) r1 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000000)={0x12, 0x0, 0x0, 0x0, 0x0, "035b0000000000000000000000000000001000"}) [ 327.938076][T18070] EXT4-fs (loop3): orphan cleanup on readonly fs [ 327.997686][T18070] EXT4-fs error (device loop3): ext4_free_inode:282: comm syz-executor.3: reserved or nonexistent inode 3 00:37:42 executing program 0: request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)='-^%d\x00', 0xffffffffffffffff) socketpair(0xa, 0x3, 0x11, &(0x7f0000000000)) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/timer_list\x00', 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_P2P_DEVICE(r0, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="14000008", @ANYRES16=r1, @ANYBLOB="010000000000000000005a000000"], 0x14}}, 0x0) sendmsg$NL80211_CMD_STOP_P2P_DEVICE(0xffffffffffffffff, 0x0, 0x0) [ 328.070656][T18070] EXT4-fs (loop3): Remounting filesystem read-only [ 328.078121][T18070] EXT4-fs warning (device loop3): ext4_enable_quotas:6442: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 328.092741][T18070] EXT4-fs (loop3): Cannot turn on quotas: error -22 [ 328.099850][T18070] EXT4-fs (loop3): mounted filesystem without journal. Opts: errors=remount-ro,. Quota mode: writeback. 00:37:42 executing program 1: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) r1 = epoll_create(0x35a2) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000140)={0x10000000}) 00:37:42 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp, 0x10, 0x0, 0x0, 0x1}, r0, 0x0, 0xffffffffffffffff, 0x0) dup2(r3, r4) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 00:37:42 executing program 3: sendmsg$NL80211_CMD_FLUSH_PMKSA(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x70bd2b, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x6, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0xfeb1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000000c0)="80810000007f", 0xfc3b, 0x1600}], 0x81, &(0x7f0000000180)={[{@errors_remount}]}) 00:37:42 executing program 0: request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)='-^%d\x00', 0xffffffffffffffff) socketpair(0xa, 0x3, 0x11, &(0x7f0000000000)) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/timer_list\x00', 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_STOP_P2P_DEVICE(r0, &(0x7f0000000200)={&(0x7f0000000100), 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="14000008", @ANYRES16=r1, @ANYBLOB="010000000000000000005a000000"], 0x14}}, 0x0) sendmsg$NL80211_CMD_STOP_P2P_DEVICE(0xffffffffffffffff, 0x0, 0x0) [ 328.220749][T18127] loop3: detected capacity change from 0 to 1051 00:37:42 executing program 4: r0 = gettid() r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000400)={0x0, 0x0, 0x0, 'queue0\x00'}) read(r1, &(0x7f0000000080)=""/238, 0xee) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000040)={0xa9}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000380)) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r1, 0xc08c5336, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue0\x00'}) tkill(r0, 0x7) 00:37:42 executing program 0: set_mempolicy(0x1, &(0x7f00000000c0)=0x5, 0x3) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x61}, {0x6}]}) 00:37:42 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa, 0x80, 0x80}}}, 0xb8}}, 0x0) [ 328.495270][T18127] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 328.521729][T18127] EXT4-fs (loop3): orphan cleanup on readonly fs 00:37:42 executing program 0: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/ipc\x00') setns(r0, 0x20000) [ 328.535923][T18127] EXT4-fs error (device loop3): ext4_free_inode:282: comm syz-executor.3: reserved or nonexistent inode 3 [ 328.548794][T18127] EXT4-fs (loop3): Remounting filesystem read-only [ 328.555771][T18127] EXT4-fs warning (device loop3): ext4_enable_quotas:6442: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 328.570722][T18127] EXT4-fs (loop3): Cannot turn on quotas: error -22 [ 328.577348][T18127] EXT4-fs (loop3): mounted filesystem without journal. Opts: errors=remount-ro,. Quota mode: writeback. 00:37:42 executing program 0: r0 = syz_io_uring_setup(0x415, &(0x7f0000000240), &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f00000002c0), &(0x7f0000000300)) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x52f4a000) madvise(&(0x7f0000ffa000/0x1000)=nil, 0x1000, 0x0) 00:37:43 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x206100, 0x0) timerfd_gettime(r0, 0x0) 00:37:43 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0xffffffffffffffff, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6641db6e0551832d303744e57e897094b15ba5d9e70400b1f14712d8ebca47f8b25e7717fd68a8378f362fbf30b8a40a525b7be87baeb12d8e440a49eb252ea2f7fc05d7e532e1a906abffff030000000000008bc3b53e32de099dad2f8fea962d0cbb0f359530f5bc65e8", 0x6b}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 00:37:43 executing program 3: sendmsg$NL80211_CMD_FLUSH_PMKSA(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x70bd2b, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x83600, 0x6, &(0x7f0000000540)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000000000004000000000002000020000020000000ddf4655fddf4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000000001000008000000d24200001203", 0x66, 0x400}, {&(0x7f0000010100)="0000000000000000000000026856d49a00cc4371bd6a7c893f280045010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0xfeb1, 0x640}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000ddf4655fddf4655fddf4655f000000000000040020", 0x1d, 0x1500}, {&(0x7f00000000c0)="80810000007f", 0xfc3b, 0x1600}], 0x81, &(0x7f0000000180)={[{@errors_remount}]}) [ 329.013036][T18173] loop3: detected capacity change from 0 to 1051 [ 329.040446][T18173] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (60935!=0) [ 329.052108][T18173] EXT4-fs (loop3): orphan cleanup on readonly fs 00:37:43 executing program 1: r0 = socket(0x200000000000011, 0x4000000000080002, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) setsockopt$packet_add_memb(r0, 0x107, 0x16, 0x0, 0x0) 00:37:43 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp, 0x10, 0x0, 0x0, 0x1}, r0, 0x0, 0xffffffffffffffff, 0x0) dup2(r3, r4) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 00:37:43 executing program 4: r0 = gettid() r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000400)={0x0, 0x0, 0x0, 'queue0\x00'}) read(r1, &(0x7f0000000080)=""/238, 0xee) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000040)={0xa9}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000380)) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r1, 0xc08c5336, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue0\x00'}) tkill(r0, 0x7) 00:37:43 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0xffffffffffffffff, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6641db6e0551832d303744e57e897094b15ba5d9e70400b1f14712d8ebca47f8b25e7717fd68a8378f362fbf30b8a40a525b7be87baeb12d8e440a49eb252ea2f7fc05d7e532e1a906abffff030000000000008bc3b53e32de099dad2f8fea962d0cbb0f359530f5bc65e8", 0x6b}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 00:37:43 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x206100, 0x0) timerfd_gettime(r0, 0x0) 00:37:43 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ffb000/0x3000)=nil, 0x3000}, &(0x7f0000000080)=0x18) [ 329.058578][T18173] EXT4-fs error (device loop3): ext4_free_inode:282: comm syz-executor.3: reserved or nonexistent inode 3 [ 329.071756][T18173] EXT4-fs (loop3): Remounting filesystem read-only [ 329.078312][T18173] EXT4-fs warning (device loop3): ext4_enable_quotas:6442: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 329.092240][T18173] EXT4-fs (loop3): Cannot turn on quotas: error -22 [ 329.098848][T18173] EXT4-fs (loop3): mounted filesystem without journal. Opts: errors=remount-ro,. Quota mode: writeback. 00:37:43 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp, 0x10, 0x0, 0x0, 0x1}, r0, 0x0, 0xffffffffffffffff, 0x0) dup2(r3, r4) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 00:37:43 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x206100, 0x0) timerfd_gettime(r0, 0x0) 00:37:43 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0xffffffffffffffff, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6641db6e0551832d303744e57e897094b15ba5d9e70400b1f14712d8ebca47f8b25e7717fd68a8378f362fbf30b8a40a525b7be87baeb12d8e440a49eb252ea2f7fc05d7e532e1a906abffff030000000000008bc3b53e32de099dad2f8fea962d0cbb0f359530f5bc65e8", 0x6b}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 00:37:44 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') dup3(r1, r0, 0x0) 00:37:44 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x206100, 0x0) timerfd_gettime(r0, 0x0) 00:37:44 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp, 0x10, 0x0, 0x0, 0x1}, r0, 0x0, 0xffffffffffffffff, 0x0) dup2(r3, r4) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 00:37:44 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp, 0x10, 0x0, 0x0, 0x1}, r0, 0x0, 0xffffffffffffffff, 0x0) dup2(r3, r4) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) [ 330.394855][ T25] kauditd_printk_skb: 40457 callbacks suppressed [ 330.394868][ T25] audit: type=1326 audit(1619743063.541:1694893): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 00:37:44 executing program 4: r0 = gettid() r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000400)={0x0, 0x0, 0x0, 'queue0\x00'}) read(r1, &(0x7f0000000080)=""/238, 0xee) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000040)={0xa9}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000380)) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r1, 0xc08c5336, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue0\x00'}) tkill(r0, 0x7) [ 330.494740][ T25] audit: type=1326 audit(1619743063.541:1694894): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 00:37:44 executing program 1: r0 = syz_io_uring_setup(0x1491, &(0x7f00000000c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000180)) io_uring_register$IORING_REGISTER_PROBE(r0, 0x8, &(0x7f00000001c0)={0x0, 0x0, 0x0, '\x00', [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, 0xb) 00:37:44 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0xffffffffffffffff, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6641db6e0551832d303744e57e897094b15ba5d9e70400b1f14712d8ebca47f8b25e7717fd68a8378f362fbf30b8a40a525b7be87baeb12d8e440a49eb252ea2f7fc05d7e532e1a906abffff030000000000008bc3b53e32de099dad2f8fea962d0cbb0f359530f5bc65e8", 0x6b}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 00:37:44 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_io_uring_setup(0x6d56, &(0x7f0000000080)={0x0, 0x0, 0x2}, &(0x7f0000db8000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000000), &(0x7f0000000100)) [ 330.529517][ T25] audit: type=1326 audit(1619743063.541:1694895): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 00:37:45 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000400)=[{&(0x7f0000000180)="eb", 0x1}, {0x0, 0x0, 0x608}], 0x0, &(0x7f00000000c0)={[{@fat=@dos1xfloppy}]}) 00:37:45 executing program 1: r0 = syz_io_uring_setup(0x1491, &(0x7f00000000c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000180)) io_uring_register$IORING_REGISTER_PROBE(r0, 0x8, &(0x7f00000001c0)={0x0, 0x0, 0x0, '\x00', [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, 0xb) 00:37:45 executing program 1: r0 = syz_io_uring_setup(0x1491, &(0x7f00000000c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000180)) io_uring_register$IORING_REGISTER_PROBE(r0, 0x8, &(0x7f00000001c0)={0x0, 0x0, 0x0, '\x00', [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, 0xb) 00:37:45 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_io_uring_setup(0x6d56, &(0x7f0000000080)={0x0, 0x0, 0x2}, &(0x7f0000db8000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000000), &(0x7f0000000100)) 00:37:45 executing program 1: r0 = syz_io_uring_setup(0x1491, &(0x7f00000000c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000180)) io_uring_register$IORING_REGISTER_PROBE(r0, 0x8, &(0x7f00000001c0)={0x0, 0x0, 0x0, '\x00', [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, 0xb) [ 331.154475][ T25] audit: type=1326 audit(1619743063.541:1694896): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 331.180019][ T25] audit: type=1326 audit(1619743063.541:1694897): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 00:37:45 executing program 0: r0 = syz_io_uring_setup(0x1491, &(0x7f00000000c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000180)) io_uring_register$IORING_REGISTER_PROBE(r0, 0x8, &(0x7f00000001c0)={0x0, 0x0, 0x0, '\x00', [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, 0xb) [ 331.234590][ T25] audit: type=1326 audit(1619743063.541:1694898): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 331.268929][ T25] audit: type=1326 audit(1619743063.541:1694899): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 331.299438][ T25] audit: type=1326 audit(1619743063.541:1694900): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 00:37:45 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp, 0x10, 0x0, 0x0, 0x1}, r0, 0x0, 0xffffffffffffffff, 0x0) dup2(r3, r4) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) [ 331.324354][ T25] audit: type=1326 audit(1619743063.541:1694901): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 331.358739][ T25] audit: type=1326 audit(1619743063.541:1694902): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 00:37:45 executing program 3: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp, 0x10, 0x0, 0x0, 0x1}, r0, 0x0, 0xffffffffffffffff, 0x0) dup2(r3, r4) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 00:37:45 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_io_uring_setup(0x6d56, &(0x7f0000000080)={0x0, 0x0, 0x2}, &(0x7f0000db8000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000000), &(0x7f0000000100)) 00:37:45 executing program 1: prctl$PR_MCE_KILL(0x21, 0x1, 0x7) 00:37:45 executing program 0: r0 = syz_io_uring_setup(0x1491, &(0x7f00000000c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000180)) io_uring_register$IORING_REGISTER_PROBE(r0, 0x8, &(0x7f00000001c0)={0x0, 0x0, 0x0, '\x00', [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, 0xb) 00:37:45 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fcntl$lock(r0, 0x7, &(0x7f0000000140)={0x3, 0x0, 0x7, 0xfffffffffffffffc, 0xffffffffffffffff}) 00:37:45 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet(r1, &(0x7f0000000a00)=[{{&(0x7f00000000c0)={0x2, 0x4e21, @loopback}, 0x10, 0x0}}, {{0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f00000013c0)="bb", 0x1}], 0x1}}], 0x2, 0x4008004) recvmmsg(r1, &(0x7f0000000940)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) write(r1, &(0x7f0000001400)="c5", 0x1) 00:37:45 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f00000002c0)={{0x2, 0x0, @remote}, {}, 0x0, {0x2, 0x0, @broadcast}}) 00:37:45 executing program 0: r0 = syz_io_uring_setup(0x1491, &(0x7f00000000c0), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000140), &(0x7f0000000180)) io_uring_register$IORING_REGISTER_PROBE(r0, 0x8, &(0x7f00000001c0)={0x0, 0x0, 0x0, '\x00', [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, 0xb) 00:37:45 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f00000002c0)={{0x2, 0x0, @remote}, {}, 0x0, {0x2, 0x0, @broadcast}}) 00:37:46 executing program 0: set_mempolicy(0x1, 0x0, 0x0) pipe(&(0x7f00000001c0)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8916, &(0x7f0000000140)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xbb\xbb\xb0]\t\x0f\x89d:\xfc%\xb4\x8f8b6\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00\x00\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x82{)\xde\t\xbb\x8a\x16\xa4L\xa6\xba\xd9\xd7\xd6\x18\x82b\x87\xc0^\xfd\xac\x8e\xfd\xdf\xb8\xe2\xd4\xd8%\xb1\x8e\x80\xaa\xbfM\xb3\xe0K\xf6U\a\x00\x00\x00>\x80\x00\x00\x00\x00\x00\x00\x00') ioctl$BTRFS_IOC_SCRUB(r2, 0xc400941b, &(0x7f0000000640)={0x0, 0x9, 0xc8aa}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x20) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x0, 0x7fffffff, 0xfffffffe) 00:37:46 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_io_uring_setup(0x6d56, &(0x7f0000000080)={0x0, 0x0, 0x2}, &(0x7f0000db8000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000000), &(0x7f0000000100)) 00:37:46 executing program 2: getresgid(&(0x7f0000000340), 0xfffffffffffffffd, 0x0) 00:37:46 executing program 0: set_mempolicy(0x1, 0x0, 0x0) pipe(&(0x7f00000001c0)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8916, &(0x7f0000000140)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xbb\xbb\xb0]\t\x0f\x89d:\xfc%\xb4\x8f8b6\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00\x00\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x82{)\xde\t\xbb\x8a\x16\xa4L\xa6\xba\xd9\xd7\xd6\x18\x82b\x87\xc0^\xfd\xac\x8e\xfd\xdf\xb8\xe2\xd4\xd8%\xb1\x8e\x80\xaa\xbfM\xb3\xe0K\xf6U\a\x00\x00\x00>\x80\x00\x00\x00\x00\x00\x00\x00') ioctl$BTRFS_IOC_SCRUB(r2, 0xc400941b, &(0x7f0000000640)={0x0, 0x9, 0xc8aa}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x20) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x0, 0x7fffffff, 0xfffffffe) 00:37:46 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f00000002c0)={{0x2, 0x0, @remote}, {}, 0x0, {0x2, 0x0, @broadcast}}) 00:37:46 executing program 5: perf_event_open$cgroup(&(0x7f0000000040)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:37:46 executing program 2: set_mempolicy(0x2, &(0x7f0000000180)=0xff, 0xf) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000140), r0) sendmsg$NLBL_CIPSOV4_C_ADD(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000180)={0x44, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_MLSCATLST={0x18, 0xc, 0x0, 0x1, [{0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}]}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_TAGLST={0x4}]}, 0x44}}, 0x0) 00:37:46 executing program 3: r0 = syz_io_uring_setup(0x2de5, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000a18000/0x3000)=nil, &(0x7f0000400000/0xc00000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000340)=0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000000200)={0x0, 0x0, 0x0}}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) io_uring_enter(r0, 0x800f3a, 0x0, 0x0, 0x0, 0x0) 00:37:46 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet(r1, &(0x7f0000000a00)=[{{&(0x7f00000000c0)={0x2, 0x4e21, @loopback}, 0x10, 0x0}}, {{0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f00000013c0)="bb", 0x1}], 0x1}}], 0x2, 0x4008004) recvmmsg(r1, &(0x7f0000000940)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) write(r1, &(0x7f0000001400)="c5", 0x1) 00:37:46 executing program 5: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) ioctl$TCSETSF(r0, 0x5453, 0x0) write$binfmt_aout(r0, 0x0, 0x0) 00:37:46 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f00000002c0)={{0x2, 0x0, @remote}, {}, 0x0, {0x2, 0x0, @broadcast}}) 00:37:46 executing program 3: r0 = syz_io_uring_setup(0x2de5, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000a18000/0x3000)=nil, &(0x7f0000400000/0xc00000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000340)=0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000000200)={0x0, 0x0, 0x0}}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) io_uring_enter(r0, 0x800f3a, 0x0, 0x0, 0x0, 0x0) 00:37:46 executing program 0: set_mempolicy(0x1, 0x0, 0x0) pipe(&(0x7f00000001c0)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8916, &(0x7f0000000140)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xbb\xbb\xb0]\t\x0f\x89d:\xfc%\xb4\x8f8b6\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00\x00\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x82{)\xde\t\xbb\x8a\x16\xa4L\xa6\xba\xd9\xd7\xd6\x18\x82b\x87\xc0^\xfd\xac\x8e\xfd\xdf\xb8\xe2\xd4\xd8%\xb1\x8e\x80\xaa\xbfM\xb3\xe0K\xf6U\a\x00\x00\x00>\x80\x00\x00\x00\x00\x00\x00\x00') ioctl$BTRFS_IOC_SCRUB(r2, 0xc400941b, &(0x7f0000000640)={0x0, 0x9, 0xc8aa}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x20) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x0, 0x7fffffff, 0xfffffffe) 00:37:46 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000380)={0x0, @l2tp={0x2, 0x0, @multicast1}, @xdp, @isdn, 0xe85, 0x0, 0x0, 0x0, 0xa}) 00:37:46 executing program 5: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x0, 0x0, @mcast1={0x0}}, 0x7c) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:37:46 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r2, 0x0) preadv(r1, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000007, 0x800000000009031, 0xffffffffffffffff, 0x0) getpeername$inet6(r0, 0x0, &(0x7f0000000040)) 00:37:46 executing program 3: r0 = syz_io_uring_setup(0x2de5, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000a18000/0x3000)=nil, &(0x7f0000400000/0xc00000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000340)=0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000000200)={0x0, 0x0, 0x0}}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) io_uring_enter(r0, 0x800f3a, 0x0, 0x0, 0x0, 0x0) 00:37:46 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x0) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000000), 0x4) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 00:37:46 executing program 0: set_mempolicy(0x1, 0x0, 0x0) pipe(&(0x7f00000001c0)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8916, &(0x7f0000000140)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xbb\xbb\xb0]\t\x0f\x89d:\xfc%\xb4\x8f8b6\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00\x00\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x82{)\xde\t\xbb\x8a\x16\xa4L\xa6\xba\xd9\xd7\xd6\x18\x82b\x87\xc0^\xfd\xac\x8e\xfd\xdf\xb8\xe2\xd4\xd8%\xb1\x8e\x80\xaa\xbfM\xb3\xe0K\xf6U\a\x00\x00\x00>\x80\x00\x00\x00\x00\x00\x00\x00') ioctl$BTRFS_IOC_SCRUB(r2, 0xc400941b, &(0x7f0000000640)={0x0, 0x9, 0xc8aa}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x20) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x0, 0x7fffffff, 0xfffffffe) 00:37:46 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = eventfd2(0x0, 0x0) io_setup(0xa3c, &(0x7f0000409000)=0x0) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r1, &(0x7f0000805ff4)) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, 0x0, &(0x7f00000001c0)) io_submit(r2, 0x1, &(0x7f0000329fd8)=[&(0x7f00002a8000)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x1, r1}]) 00:37:47 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet(r1, &(0x7f0000000a00)=[{{&(0x7f00000000c0)={0x2, 0x4e21, @loopback}, 0x10, 0x0}}, {{0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f00000013c0)="bb", 0x1}], 0x1}}], 0x2, 0x4008004) recvmmsg(r1, &(0x7f0000000940)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) write(r1, &(0x7f0000001400)="c5", 0x1) 00:37:47 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = syz_io_uring_setup(0x15b4, &(0x7f0000000340), &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000eea000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}, 0x0) io_uring_enter(r1, 0x6deb, 0x0, 0x0, 0x0, 0x0) clock_nanosleep(0x0, 0xb, &(0x7f00000000c0)={0x77359400}, 0x0) sendmsg$NLBL_CIPSOV4_C_LIST(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0), 0xc, 0x0}, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "1d4b9d847c2cc87dd438128d010687f92a18a9"}) 00:37:47 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x5) ioctl$int_in(r0, 0x5452, &(0x7f00000000c0)=0x7) 00:37:47 executing program 3: r0 = syz_io_uring_setup(0x2de5, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000a18000/0x3000)=nil, &(0x7f0000400000/0xc00000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000340)=0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000000200)={0x0, 0x0, 0x0}}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.stat\x00', 0x275a, 0x0) write$binfmt_script(r4, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r4, 0x0) io_uring_enter(r0, 0x800f3a, 0x0, 0x0, 0x0, 0x0) 00:37:47 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = eventfd2(0x0, 0x0) io_setup(0xa3c, &(0x7f0000409000)=0x0) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r1, &(0x7f0000805ff4)) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, 0x0, &(0x7f00000001c0)) io_submit(r2, 0x1, &(0x7f0000329fd8)=[&(0x7f00002a8000)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x1, r1}]) 00:37:47 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r2, 0x0) preadv(r1, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000007, 0x800000000009031, 0xffffffffffffffff, 0x0) getpeername$inet6(r0, 0x0, &(0x7f0000000040)) 00:37:47 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x8, &(0x7f0000000000)=0x7, 0x4) bind(r0, &(0x7f0000000080)=@in={0x2, 0x4e20}, 0x7c) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x2, 0x8004e20}, 0x10) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000040)=0x14d9, 0x4) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) 00:37:47 executing program 3: r0 = open(&(0x7f0000000080)='./file0\x00', 0x42, 0x0) fallocate(r0, 0x40, 0x0, 0x5) 00:37:47 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = eventfd2(0x0, 0x0) io_setup(0xa3c, &(0x7f0000409000)=0x0) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r1, &(0x7f0000805ff4)) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, 0x0, &(0x7f00000001c0)) io_submit(r2, 0x1, &(0x7f0000329fd8)=[&(0x7f00002a8000)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x1, r1}]) 00:37:47 executing program 3: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f0000ee7000/0x2000)=nil, &(0x7f0000444000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000380)=0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0xfffffe62, &(0x7f0000000100)=@ax25={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, [@default, @default, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @null, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}}, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) io_uring_enter(r0, 0x45f5, 0x0, 0x0, 0x0, 0x0) 00:37:47 executing program 2: r0 = semget$private(0x0, 0x8, 0x0) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000080)=[0x200]) semop(r0, &(0x7f0000000100), 0x2d) semop(r0, &(0x7f0000000000)=[{}, {0x0, 0x7}], 0x2) semctl$GETZCNT(r0, 0x0, 0xf, 0x0) 00:37:47 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x8, &(0x7f0000000000)=0x7, 0x4) bind(r0, &(0x7f0000000080)=@in={0x2, 0x4e20}, 0x7c) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x2, 0x8004e20}, 0x10) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000040)=0x14d9, 0x4) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) 00:37:48 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet(r1, &(0x7f0000000a00)=[{{&(0x7f00000000c0)={0x2, 0x4e21, @loopback}, 0x10, 0x0}}, {{0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f00000013c0)="bb", 0x1}], 0x1}}], 0x2, 0x4008004) recvmmsg(r1, &(0x7f0000000940)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) write(r1, &(0x7f0000001400)="c5", 0x1) 00:37:48 executing program 3: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0xc0000101, 0x0) 00:37:48 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x8, &(0x7f0000000000)=0x7, 0x4) bind(r0, &(0x7f0000000080)=@in={0x2, 0x4e20}, 0x7c) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x2, 0x8004e20}, 0x10) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000040)=0x14d9, 0x4) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) 00:37:48 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = eventfd2(0x0, 0x0) io_setup(0xa3c, &(0x7f0000409000)=0x0) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r1, &(0x7f0000805ff4)) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x0, 0x0, &(0x7f00000001c0)) io_submit(r2, 0x1, &(0x7f0000329fd8)=[&(0x7f00002a8000)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x1, r1}]) 00:37:48 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r2, 0x0) preadv(r1, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000007, 0x800000000009031, 0xffffffffffffffff, 0x0) getpeername$inet6(r0, 0x0, &(0x7f0000000040)) 00:37:48 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000040)=0xffffffffffffffff) 00:37:48 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x8, &(0x7f0000000000)=0x7, 0x4) bind(r0, &(0x7f0000000080)=@in={0x2, 0x4e20}, 0x7c) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x2, 0x8004e20}, 0x10) setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000040)=0x14d9, 0x4) recvmsg(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) 00:37:48 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r0, 0x29, 0x16, &(0x7f00000000c0), 0x4) setsockopt$inet6_int(r0, 0x29, 0x16, &(0x7f0000000040), 0x4) 00:37:48 executing program 5: r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r0, 0xfffffffffffffffb) 00:37:48 executing program 0: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0xfffffffd}) 00:37:48 executing program 2: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802000001000001010022001e0000000000001e00080000000008007809140b2a3a080200000100000101013400200000000000002064000000000000647809140b2a3a08000000010000011200660000006c0065002e0063006f006c0064002c001f0000000000001f0008000000000800780b140b2a3a88020000010000010a00660069006c00650030", 0xa3, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) r1 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = dup(r0) openat(r2, &(0x7f0000007b80)='./file0\x00', 0x0, 0x0) 00:37:48 executing program 3: r0 = syz_io_uring_setup(0x102e, &(0x7f0000000140), &(0x7f0000ff7000/0x8000)=nil, &(0x7f0000ff7000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000680)) io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) [ 334.546959][T18488] loop2: detected capacity change from 0 to 240 00:37:49 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r2, 0x0) preadv(r1, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000007, 0x800000000009031, 0xffffffffffffffff, 0x0) getpeername$inet6(r0, 0x0, &(0x7f0000000040)) 00:37:49 executing program 5: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TIOCGPTPEER(r0, 0x5428, 0x0) 00:37:49 executing program 0: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0xfffffffd}) 00:37:49 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@local, 0x0, 0x2, 0x3}, 0x20) 00:37:49 executing program 2: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802000001000001010022001e0000000000001e00080000000008007809140b2a3a080200000100000101013400200000000000002064000000000000647809140b2a3a08000000010000011200660000006c0065002e0063006f006c0064002c001f0000000000001f0008000000000800780b140b2a3a88020000010000010a00660069006c00650030", 0xa3, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) r1 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = dup(r0) openat(r2, &(0x7f0000007b80)='./file0\x00', 0x0, 0x0) 00:37:49 executing program 1: r0 = request_key(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={'syz', 0x3}, 0x0, 0x0) keyctl$search(0xa, r0, &(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={'syz', 0x3}, 0x0) 00:37:49 executing program 3: r0 = socket(0x2, 0xa, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) 00:37:49 executing program 0: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0xfffffffd}) 00:37:49 executing program 2: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802000001000001010022001e0000000000001e00080000000008007809140b2a3a080200000100000101013400200000000000002064000000000000647809140b2a3a08000000010000011200660000006c0065002e0063006f006c0064002c001f0000000000001f0008000000000800780b140b2a3a88020000010000010a00660069006c00650030", 0xa3, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) r1 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = dup(r0) openat(r2, &(0x7f0000007b80)='./file0\x00', 0x0, 0x0) 00:37:49 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000000c0)="d6", 0x1}, {0x0}, {&(0x7f0000000240)="f1", 0x1}], 0x3}, 0x0) [ 335.186467][T18514] loop2: detected capacity change from 0 to 240 00:37:49 executing program 2: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010a00)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000b9010000000001b9252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000000240)="22001e0000000000001e00080000000008007809140b2a3a0802000001000001010022001e0000000000001e00080000000008007809140b2a3a080200000100000101013400200000000000002064000000000000647809140b2a3a08000000010000011200660000006c0065002e0063006f006c0064002c001f0000000000001f0008000000000800780b140b2a3a88020000010000010a00660069006c00650030", 0xa3, 0xf000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='check=strict,uid=', @ANYBLOB='2']) r1 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = dup(r0) openat(r2, &(0x7f0000007b80)='./file0\x00', 0x0, 0x0) 00:37:49 executing program 1: sendmsg$AUDIT_USER(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0xbd4}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001000)=ANY=[@ANYBLOB="18ed030004000000000000"], 0x12}}], 0x1, 0x0) sigaltstack(&(0x7f0000001000/0x4000)=nil, 0x0) sigaltstack(&(0x7f0000001000/0x4000)=nil, &(0x7f0000000140)) [ 335.400119][ T25] kauditd_printk_skb: 49910 callbacks suppressed [ 335.400128][ T25] audit: type=1326 audit(1619743069.682:1744813): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 00:37:49 executing program 0: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x0, 0xfffffffd}) 00:37:49 executing program 2: r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c29}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x40) r1 = openat$ttyS3(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSBRKP(r1, 0x5425, 0x0) r2 = openat$ttyS3(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSBRKP(r2, 0x5425, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000002380), 0x2400, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002440)=[{&(0x7f00000000c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000002300)=[{0x0}, {0x0}], 0x2, &(0x7f00000023c0)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xee01}}}], 0x20}], 0x1, 0x884) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x4000010, r0, 0xae503000) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x11, 0x3f}], 0x18) 00:37:49 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="66530700ae897094e71b0fa1f147a8378f3657cdcf86db93aa6ed9cbc6a9", 0x1e}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x5) tkill(r1, 0x1e) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="02000000010004000000000002000100", @ANYRES32, @ANYBLOB="040004000000000008000400", @ANYRES32, @ANYBLOB="08000500", @ANYRES32, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0xee00, @ANYBLOB="01000000", @ANYRES32, @ANYBLOB="08000300", @ANYRES32, @ANYBLOB="08000500", @ANYRES32=0xee00, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=0xee01, @ANYBLOB="08000400", @ANYRES32=0xee01, @ANYBLOB='\b', @ANYRES32], 0x7c, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) exit_group(0x0) 00:37:49 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_io_uring_setup(0x1e28, &(0x7f0000000080), &(0x7f0000ff3000/0x3000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000140)=0x0) r4 = open(&(0x7f0000000280)='./bus\x00', 0x4042, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x6000, @fd=r4, 0x0, 0x0}, 0x0) io_uring_enter(r1, 0x450c, 0x0, 0x0, 0x0, 0x34) 00:37:49 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) r2 = dup2(r1, r1) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendfile(r1, r2, 0x0, 0x80000000) 00:37:49 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f0000000000)='system.posix_acl_default\x00', &(0x7f0000000180), 0x24, 0x0) [ 335.434262][ T25] audit: type=1326 audit(1619743069.722:1744814): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 335.459335][ T25] audit: type=1326 audit(1619743069.722:1744815): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 00:37:49 executing program 4: r0 = syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001500)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020002020202020202020202020200000000000000000bf000000000000bf0000eeff0000000000000000000000000000000000000000000000000000000001000001010000010008080018000000000000181400000000000000000000160000000022001c", 0x9f, 0x8000}, {&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000bf000000000000bf252f", 0x5a, 0x8800}, {&(0x7f0000000240)="88001c0000000000001c00080800000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a", 0x55, 0xe000}], 0x0, &(0x7f0000000140)=ANY=[@ANYRES64=0x0, @ANYRES16]) open_by_handle_at(r0, &(0x7f0000000180)=@ocfs2={0xc, 0x1, {0x7, 0xf13, 0x1}}, 0x400) [ 335.526454][T18551] new mount options do not match the existing superblock, will be ignored [ 335.527766][ T25] audit: type=1326 audit(1619743069.722:1744816): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 335.560193][T18551] new mount options do not match the existing superblock, will be ignored 00:37:49 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) ioctl$sock_SIOCDELRT(r1, 0x890c, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r1, 0xc0c89425, &(0x7f0000000140)={"389972b6a9c30be0da9d157541056c49", 0x0, 0x0, {0x0, 0xcdc4}, {0x4, 0x6de}, 0x81, [0x6, 0x1ff, 0x0, 0x265, 0x9, 0xffff, 0x200, 0x40, 0xfffffffffffffff8, 0x9838, 0x6, 0x8, 0x2, 0x6, 0x7, 0x3bf2a2f2]}) ioctl$sock_SIOCDELRT(r0, 0x890b, &(0x7f00000000c0)={0x0, @in={0x2, 0x0, @remote}, @in={0x2, 0x0, @remote}, @rc={0x1f, @any, 0xff}, 0xf4}) 00:37:49 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000000)={{{@in=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}, {{@in6=@mcast1, 0x0, 0x6c}, 0x2, @in=@empty, 0x0, 0x1}}, 0xe8) 00:37:49 executing program 3: r0 = io_uring_setup(0xe9a, &(0x7f0000000100)) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = dup2(r0, r0) io_uring_register$IORING_REGISTER_EVENTFD(r0, 0x4, &(0x7f0000000000)=r1, 0x1) 00:37:49 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setgid(r1) chmod(&(0x7f00000000c0)='./file0\x00', 0x0) [ 335.575541][ T25] audit: type=1326 audit(1619743069.722:1744817): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 335.601665][T18561] loop4: detected capacity change from 0 to 224 00:37:49 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0xfffffd28) write$snapshot(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x6, 0x0, "0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030cf00"}, 0xd8) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @empty}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r1, &(0x7f0000000240)={0x0, 0xfffffffffffffd83, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x7ffff000}], 0x1, 0x0, 0xf080}, 0x100) write$binfmt_elf64(r1, &(0x7f0000000480)=ANY=[], 0x1000001bd) 00:37:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x6, &(0x7f0000000040)={0x14, {{0x29, 0x0, 0x2000000, @local}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}}, 0x133) [ 335.666724][ T25] audit: type=1326 audit(1619743069.722:1744818): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 335.692919][ T25] audit: type=1326 audit(1619743069.722:1744819): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 335.722715][ T25] audit: type=1326 audit(1619743069.722:1744820): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 335.749626][ T25] audit: type=1326 audit(1619743069.722:1744821): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 335.785138][ T25] audit: type=1326 audit(1619743069.722:1744822): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 00:37:50 executing program 2: r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c29}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x40) r1 = openat$ttyS3(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSBRKP(r1, 0x5425, 0x0) r2 = openat$ttyS3(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSBRKP(r2, 0x5425, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000002380), 0x2400, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002440)=[{&(0x7f00000000c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000002300)=[{0x0}, {0x0}], 0x2, &(0x7f00000023c0)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xee01}}}], 0x20}], 0x1, 0x884) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x4000010, r0, 0xae503000) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x11, 0x3f}], 0x18) 00:37:50 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) rmdir(&(0x7f0000000080)='./file0\x00') fchdir(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0x0, 0x0}) sendmmsg(r1, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) 00:37:50 executing program 1: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) close(r0) 00:37:50 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x6a, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) r0 = gettid() r1 = signalfd4(0xffffffffffffffff, &(0x7f0000006000)={[0xfffffffffffffffe]}, 0x8, 0x0) poll(&(0x7f0000000100)=[{r1, 0x7}], 0x1, 0xfffffffffffffff8) tkill(r0, 0x14) 00:37:50 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000c40), r1) sendmsg$NLBL_MGMT_C_ADD(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)={0x2c, r2, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_PROTOCOL={0x8}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @broadcast}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, '..\'\x00'}]}, 0x2c}}, 0x0) 00:37:50 executing program 3: r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c29}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x40) r1 = openat$ttyS3(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSBRKP(r1, 0x5425, 0x0) r2 = openat$ttyS3(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSBRKP(r2, 0x5425, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000002380), 0x2400, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002440)=[{&(0x7f00000000c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000002300)=[{0x0}, {0x0}], 0x2, &(0x7f00000023c0)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xee01}}}], 0x20}], 0x1, 0x884) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x4000010, r0, 0xae503000) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x11, 0x3f}], 0x18) 00:37:50 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000300)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x40000000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000000), 0x0, &(0x7f0000000080)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 00:37:50 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000380), r1) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)={0x5c, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_TAGLST={0x34, 0x4, 0x0, 0x1, [{0x4}, {0x5}, {0x5}, {0x5}, {0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_DOI={0x8}]}, 0x5c}}, 0x0) 00:37:50 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0xd, &(0x7f0000000180)=""/47, &(0x7f00000001c0)=0x2f) 00:37:50 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000280)={0x0, "0c7ec60e3175f06c006ce89f09d458950f5cba01d652c53e5c73218cb94a838607483135311259971735893edee9146b893963c3f68f4aab7b5edb7e2aa50e50"}, 0x48, r1) keyctl$chown(0x4, r2, 0xffffffffffffffff, 0x0) 00:37:50 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = fsopen(&(0x7f0000000000)='mqueue\x00', 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) 00:37:50 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0xd, &(0x7f0000000180)=""/47, &(0x7f00000001c0)=0x2f) 00:37:51 executing program 2: r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c29}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x40) r1 = openat$ttyS3(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSBRKP(r1, 0x5425, 0x0) r2 = openat$ttyS3(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSBRKP(r2, 0x5425, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000002380), 0x2400, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002440)=[{&(0x7f00000000c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000002300)=[{0x0}, {0x0}], 0x2, &(0x7f00000023c0)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xee01}}}], 0x20}], 0x1, 0x884) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x4000010, r0, 0xae503000) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x11, 0x3f}], 0x18) 00:37:51 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0xfffffd28) write$snapshot(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x6, 0x0, "0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030cf00"}, 0xd8) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @empty}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r1, &(0x7f0000000240)={0x0, 0xfffffffffffffd83, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x7ffff000}], 0x1, 0x0, 0xf080}, 0x100) write$binfmt_elf64(r1, &(0x7f0000000480)=ANY=[], 0x1000001bd) 00:37:51 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/locks\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/43, 0x2b) preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000080)=""/9, 0x9}], 0x1, 0x1, 0x0) 00:37:51 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0xd, &(0x7f0000000180)=""/47, &(0x7f00000001c0)=0x2f) 00:37:51 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0xfffffd28) write$snapshot(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x6, 0x0, "0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030cf00"}, 0xd8) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @empty}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r1, &(0x7f0000000240)={0x0, 0xfffffffffffffd83, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x7ffff000}], 0x1, 0x0, 0xf080}, 0x100) write$binfmt_elf64(r1, &(0x7f0000000480)=ANY=[], 0x1000001bd) 00:37:51 executing program 3: r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c29}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x40) r1 = openat$ttyS3(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSBRKP(r1, 0x5425, 0x0) r2 = openat$ttyS3(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSBRKP(r2, 0x5425, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000002380), 0x2400, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002440)=[{&(0x7f00000000c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000002300)=[{0x0}, {0x0}], 0x2, &(0x7f00000023c0)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xee01}}}], 0x20}], 0x1, 0x884) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x4000010, r0, 0xae503000) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x11, 0x3f}], 0x18) 00:37:51 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0xd, &(0x7f0000000180)=""/47, &(0x7f00000001c0)=0x2f) 00:37:51 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/locks\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/43, 0x2b) preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000080)=""/9, 0x9}], 0x1, 0x1, 0x0) 00:37:51 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/locks\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/43, 0x2b) preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000080)=""/9, 0x9}], 0x1, 0x1, 0x0) 00:37:51 executing program 5: keyctl$restrict_keyring(0x18, 0xfffffffffffffffd, 0x0, &(0x7f0000000000)=' \x00\x00\x00\x00\x00\x00\x00\x00:\xee\x17\xd3$/\x86M\x91pp\nq0/K \xd7Yd\xc4g\xd16`k\x1cG+x.i\xbe\x89\xca\xe3V8\xb7D\xff{\x1a!\xdd\\e*\x82\x82ll\xd7\xf8\xf0\xe5\xe4\xa9\xfaZ\x9f\x84-') 00:37:51 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/locks\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/43, 0x2b) preadv(r0, &(0x7f0000000480)=[{&(0x7f0000000080)=""/9, 0x9}], 0x1, 0x1, 0x0) 00:37:51 executing program 5: r0 = syz_io_uring_setup(0x298b, &(0x7f0000000000), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000300), &(0x7f0000000140)) sendmsg$NLBL_UNLABEL_C_STATICADDDEF(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000001c0), 0xc, 0x0}, 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000180), 0x4f) 00:37:51 executing program 2: r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c29}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x40) r1 = openat$ttyS3(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSBRKP(r1, 0x5425, 0x0) r2 = openat$ttyS3(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSBRKP(r2, 0x5425, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000002380), 0x2400, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002440)=[{&(0x7f00000000c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000002300)=[{0x0}, {0x0}], 0x2, &(0x7f00000023c0)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xee01}}}], 0x20}], 0x1, 0x884) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x4000010, r0, 0xae503000) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x11, 0x3f}], 0x18) 00:37:52 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0xfffffd28) write$snapshot(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x6, 0x0, "0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030cf00"}, 0xd8) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @empty}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r1, &(0x7f0000000240)={0x0, 0xfffffffffffffd83, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x7ffff000}], 0x1, 0x0, 0xf080}, 0x100) write$binfmt_elf64(r1, &(0x7f0000000480)=ANY=[], 0x1000001bd) 00:37:52 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r1) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0x15) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0xd9f, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = io_uring_setup(0x360e, &(0x7f0000000040)={0x0, 0xf0b0, 0x20, 0x1, 0x60}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x110, r3, 0x21da5000) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x4ffe0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) 00:37:52 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) recvfrom$inet6(r0, 0x0, 0x0, 0x20, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:37:52 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0xfffffd28) write$snapshot(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x6, 0x0, "0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030cf00"}, 0xd8) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @empty}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r1, &(0x7f0000000240)={0x0, 0xfffffffffffffd83, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x7ffff000}], 0x1, 0x0, 0xf080}, 0x100) write$binfmt_elf64(r1, &(0x7f0000000480)=ANY=[], 0x1000001bd) 00:37:52 executing program 3: r0 = syz_open_dev$evdev(0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c29}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x6, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x40) r1 = openat$ttyS3(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSBRKP(r1, 0x5425, 0x0) r2 = openat$ttyS3(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSBRKP(r2, 0x5425, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000002380), 0x2400, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002440)=[{&(0x7f00000000c0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000002300)=[{0x0}, {0x0}], 0x2, &(0x7f00000023c0)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xee01}}}], 0x20}], 0x1, 0x884) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x4000010, r0, 0xae503000) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x11, 0x3f}], 0x18) 00:37:52 executing program 5: prlimit64(0x0, 0x7, &(0x7f0000000040), 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) [ 338.046938][T18704] ref_ctr going negative. vaddr: 0x20000004, curr val: -31789, delta: 1 [ 338.055542][T18704] ref_ctr increment failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000b2c9e47a 00:37:52 executing program 5: fsmount(0xffffffffffffffff, 0x0, 0x70) [ 338.188643][T18714] ref_ctr going negative. vaddr: 0x20000004, curr val: -31789, delta: 1 [ 338.197084][T18714] ref_ctr increment failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000b2c9e47a 00:37:52 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1000000000022, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='reno\x00', 0x5) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendmmsg(r0, &(0x7f0000004f40)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000240)='\a', 0x1}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x24044075) [ 338.287284][T18704] ref_ctr going negative. vaddr: 0x20000004, curr val: -31789, delta: 1 [ 338.295892][T18704] ref_ctr increment failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000b2c9e47a 00:37:52 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r1) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0x15) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0xd9f, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = io_uring_setup(0x360e, &(0x7f0000000040)={0x0, 0xf0b0, 0x20, 0x1, 0x60}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x110, r3, 0x21da5000) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x4ffe0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) 00:37:52 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r1) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0x15) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0xd9f, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = io_uring_setup(0x360e, &(0x7f0000000040)={0x0, 0xf0b0, 0x20, 0x1, 0x60}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x110, r3, 0x21da5000) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x4ffe0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) 00:37:52 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, 0x0, 0xeffd) [ 338.548540][T18734] ref_ctr going negative. vaddr: 0x20000004, curr val: -31789, delta: 1 [ 338.557082][T18734] ref_ctr increment failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000b2c9e47a [ 338.658960][T18751] new mount options do not match the existing superblock, will be ignored [ 338.693604][T18751] new mount options do not match the existing superblock, will be ignored 00:37:53 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8912, &(0x7f0000000000)={'veth1_to_bridge\x00'}) [ 338.794525][T18742] ref_ctr going negative. vaddr: 0x20000004, curr val: -31789, delta: 1 [ 338.802946][T18742] ref_ctr increment failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000b2c9e47a 00:37:53 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0xfffffd28) write$snapshot(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x6, 0x0, "0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030cf00"}, 0xd8) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @empty}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r1, &(0x7f0000000240)={0x0, 0xfffffffffffffd83, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x7ffff000}], 0x1, 0x0, 0xf080}, 0x100) write$binfmt_elf64(r1, &(0x7f0000000480)=ANY=[], 0x1000001bd) 00:37:53 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000d5f4655fd5f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)={[{@debug_want_extra_isize}]}) 00:37:53 executing program 3: r0 = open(&(0x7f0000000000)='./file0\x00', 0x1050c2, 0x0) open_by_handle_at(r0, &(0x7f0000000040)=@ocfs2={0xc, 0x1, {0x20000}}, 0x0) 00:37:53 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0xfffffd28) write$snapshot(0xffffffffffffffff, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x0, @local}}, 0x0, 0x9, 0x6, 0x0, "0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030cf00"}, 0xd8) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @empty}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) recvmsg(r1, &(0x7f0000000240)={0x0, 0xfffffffffffffd83, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x7ffff000}], 0x1, 0x0, 0xf080}, 0x100) write$binfmt_elf64(r1, &(0x7f0000000480)=ANY=[], 0x1000001bd) [ 339.037859][T18738] ref_ctr going negative. vaddr: 0x20000004, curr val: -31789, delta: 1 [ 339.046329][T18738] ref_ctr increment failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000b2c9e47a 00:37:53 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r1) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0x15) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0xd9f, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = io_uring_setup(0x360e, &(0x7f0000000040)={0x0, 0xf0b0, 0x20, 0x1, 0x60}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x110, r3, 0x21da5000) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x4ffe0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) 00:37:53 executing program 3: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000300)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$KEYCTL_MOVE(0xb, r0, 0xfffffffffffffff8, 0xffffffffffffffff, 0x0) [ 339.094465][T18771] loop2: detected capacity change from 0 to 4 [ 339.116159][T18771] EXT4-fs (loop2): Invalid want_extra_isize 0 [ 339.163631][T18771] loop2: detected capacity change from 0 to 4 [ 339.175092][T18771] EXT4-fs (loop2): Invalid want_extra_isize 0 00:37:53 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000000c0), 0x0, 0x0) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) [ 339.208634][T18743] ref_ctr going negative. vaddr: 0x20000004, curr val: -31789, delta: 1 [ 339.217152][T18743] ref_ctr increment failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000b2c9e47a 00:37:53 executing program 2: r0 = socket(0x10, 0x803, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x31, &(0x7f0000000000), 0x20a154cc) 00:37:53 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r1) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0x15) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0xd9f, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = io_uring_setup(0x360e, &(0x7f0000000040)={0x0, 0xf0b0, 0x20, 0x1, 0x60}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x110, r3, 0x21da5000) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x4ffe0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) 00:37:53 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e71b0fb1f147a8378f364602812c66538d750f6ee1d001f43f0500bb9fb045f2d1eaa302ab6c2fef2308003ea1315b9532f3af2f5e153eb78020fa00eb29880245ded4181a54ea1a9f7506516460be23e70c76eb09a55101e585e55fcde2dd6b077f74cf6f3237", 0x6f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x4) 00:37:53 executing program 3: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@remote, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x80}}, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x0, @in6=@mcast1}}, 0xe4) r1 = socket$inet_udp(0x2, 0x2, 0x0) dup2(r1, r0) [ 339.368577][T18785] ref_ctr going negative. vaddr: 0x20000004, curr val: -31789, delta: 1 [ 339.377024][T18785] ref_ctr increment failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000b2c9e47a 00:37:53 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e71b0fb1f147a8378f364602812c66538d750f6ee1d001f43f0500bb9fb045f2d1eaa302ab6c2fef2308003ea1315b9532f3af2f5e153eb78020fa00eb29880245ded4181a54ea1a9f7506516460be23e70c76eb09a55101e585e55fcde2dd6b077f74cf6f3237", 0x6f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x4) [ 339.542645][T18787] ref_ctr going negative. vaddr: 0x20000004, curr val: -31789, delta: 1 [ 339.551149][T18787] ref_ctr increment failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000b2c9e47a [ 339.661458][T18805] ref_ctr going negative. vaddr: 0x20000004, curr val: -31789, delta: 1 [ 339.669913][T18805] ref_ctr increment failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000b2c9e47a 00:37:54 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r1) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0x15) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0xd9f, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = io_uring_setup(0x360e, &(0x7f0000000040)={0x0, 0xf0b0, 0x20, 0x1, 0x60}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x110, r3, 0x21da5000) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x4ffe0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) 00:37:54 executing program 4: syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000001640), 0x0, &(0x7f0000001700)={[{@fat=@tz_utc}], [{@context={'context', 0x3d, 'sysadm_u'}, 0x22}, {@pcr}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@fsmagic}, {@uid_gt={'uid>', 0xee01}}, {@appraise_type}, {@appraise_type}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) 00:37:54 executing program 1: syz_mount_image$iso9660(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='mode=0']) [ 339.967732][T18812] ref_ctr going negative. vaddr: 0x20000004, curr val: -31789, delta: 1 [ 339.976130][T18812] ref_ctr increment failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000b2c9e47a [ 340.054887][T18824] FAT-fs (loop4): bogus number of reserved sectors [ 340.061594][T18824] FAT-fs (loop4): Can't find a valid FAT filesystem 00:37:54 executing program 1: perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) faccessat2(0xffffffffffffffff, 0x0, 0x62, 0x1300) io_setup(0x0, 0x0) 00:37:54 executing program 5: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r1) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000340)=ANY=[], 0x15) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) preadv(0xffffffffffffffff, 0x0, 0x0, 0xd9f, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = io_uring_setup(0x360e, &(0x7f0000000040)={0x0, 0xf0b0, 0x20, 0x1, 0x60}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x110, r3, 0x21da5000) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x4ffe0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) [ 340.103264][T18824] FAT-fs (loop4): bogus number of reserved sectors [ 340.108591][T18825] ref_ctr going negative. vaddr: 0x20000004, curr val: -31789, delta: 1 [ 340.109826][T18824] FAT-fs (loop4): Can't find a valid FAT filesystem [ 340.124887][T18825] ref_ctr increment failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000b2c9e47a 00:37:54 executing program 4: syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000001640), 0x0, &(0x7f0000001700)={[{@fat=@tz_utc}], [{@context={'context', 0x3d, 'sysadm_u'}, 0x22}, {@pcr}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@fsmagic}, {@uid_gt={'uid>', 0xee01}}, {@appraise_type}, {@appraise_type}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) [ 340.278887][T18833] ref_ctr going negative. vaddr: 0x20000004, curr val: -31789, delta: 1 [ 340.287344][T18833] ref_ctr increment failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000b2c9e47a [ 340.328395][T18850] FAT-fs (loop4): bogus number of reserved sectors [ 340.335116][T18850] FAT-fs (loop4): Can't find a valid FAT filesystem [ 340.367671][T18843] ref_ctr going negative. vaddr: 0x20000004, curr val: -31789, delta: 1 00:37:54 executing program 3: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@remote, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x80}}, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x0, @in6=@mcast1}}, 0xe4) r1 = socket$inet_udp(0x2, 0x2, 0x0) dup2(r1, r0) [ 340.376109][T18843] ref_ctr increment failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000b2c9e47a [ 340.410756][ T25] kauditd_printk_skb: 48645 callbacks suppressed 00:37:54 executing program 4: syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000001640), 0x0, &(0x7f0000001700)={[{@fat=@tz_utc}], [{@context={'context', 0x3d, 'sysadm_u'}, 0x22}, {@pcr}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@fsmagic}, {@uid_gt={'uid>', 0xee01}}, {@appraise_type}, {@appraise_type}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) 00:37:54 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xb0, &(0x7f0000000440)="c4c6912d45366bf69e7253d1e0a593b040d762910000000000000022addee07bee0d6333b5cacd893169b618322ff6602022511253508b5a4496728c2a46e1bc340e29b9ab9b7136323e350808ffdb2dbea7410b363de4fb157baa17dacdcffe3510a6ffac32957dc8bb44e203c4b1bc83d8c0b29f75bcf2e34829450c4db583a2d9dd3bf7a0b9daf36c29d2010000004491a4a884fffffffffffffff830843900bb4ff9a7df5ee0fdbb6e3a28ad7f5e"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 340.410767][ T25] audit: type=1326 audit(1619743074.682:1793468): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 340.445504][ T25] audit: type=1326 audit(1619743074.732:1793469): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 340.470695][ T25] audit: type=1326 audit(1619743074.732:1793470): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 340.495775][ T25] audit: type=1326 audit(1619743074.732:1793471): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 340.524898][T18869] FAT-fs (loop4): bogus number of reserved sectors [ 340.531542][T18869] FAT-fs (loop4): Can't find a valid FAT filesystem [ 340.538925][ T25] audit: type=1326 audit(1619743074.732:1793472): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 340.563601][ T25] audit: type=1326 audit(1619743074.732:1793473): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 340.599286][ T25] audit: type=1326 audit(1619743074.732:1793474): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 340.609053][T18849] ref_ctr going negative. vaddr: 0x20000004, curr val: -31789, delta: 1 [ 340.632559][T18849] ref_ctr increment failed for inode: 0x361c offset: 0x0 ref_ctr_offset: 0x4 of mm: 0x00000000b2c9e47a [ 340.633192][ T25] audit: type=1326 audit(1619743074.732:1793475): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 00:37:55 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000440)={0x50, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x72, 0x2, 0x0, 0x0, 0x8}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000002c0)=0x0) sched_setattr(r3, &(0x7f0000000300)={0x38, 0x2, 0x40, 0x7ff, 0x3f00, 0x7, 0x101, 0x9, 0x2, 0x97}, 0x0) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000480)="b0a3cdef47f59ec515de0fcb5dfc761cf7120c4312b2054efdc0cf574f65329a05d03a24674b1d94d072b4bd702c576dc1d6e4fef97bdd899d359dadcfe32ba24fb1e152533e4df2c20324dda85d95c102000000d81d2b9bea7f9e468b3da19d62e9913b2f7cd488de25886811470818af91afd3bce1422670d6f2d054d8b16374e3617a22b1c70e7e3104b814e24e6e7b62256ae8faaae5f59f840c029418a34c", 0xffffff47) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) mkdir(&(0x7f0000000540)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000003c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') sched_setattr(0x0, &(0x7f00000001c0)={0x38}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sched_setattr(r0, &(0x7f0000000240)={0x38, 0x3, 0x28, 0xffff, 0x10001, 0x80000000, 0x1, 0x100000001, 0x4d0, 0x2000000}, 0x0) truncate(&(0x7f00000005c0)='./file0\x00', 0xfff) unlink(&(0x7f0000000040)='./file0\x00') open(&(0x7f00000000c0)='./file0\x00', 0x3fd, 0x0) [ 340.668714][ T25] audit: type=1326 audit(1619743074.732:1793476): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 340.693953][ T25] audit: type=1326 audit(1619743074.732:1793477): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 00:37:55 executing program 4: syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000001640), 0x0, &(0x7f0000001700)={[{@fat=@tz_utc}], [{@context={'context', 0x3d, 'sysadm_u'}, 0x22}, {@pcr}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@fsmagic}, {@uid_gt={'uid>', 0xee01}}, {@appraise_type}, {@appraise_type}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) [ 340.805071][T18887] FAT-fs (loop4): bogus number of reserved sectors [ 340.811730][T18887] FAT-fs (loop4): Can't find a valid FAT filesystem 00:37:56 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e71b0fb1f147a8378f364602812c66538d750f6ee1d001f43f0500bb9fb045f2d1eaa302ab6c2fef2308003ea1315b9532f3af2f5e153eb78020fa00eb29880245ded4181a54ea1a9f7506516460be23e70c76eb09a55101e585e55fcde2dd6b077f74cf6f3237", 0x6f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x4) 00:37:56 executing program 3: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@remote, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x80}}, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x0, @in6=@mcast1}}, 0xe4) r1 = socket$inet_udp(0x2, 0x2, 0x0) dup2(r1, r0) 00:37:56 executing program 5: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x541b, 0x0) 00:37:56 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={@local, @remote, @mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20c200b2}) 00:37:56 executing program 1: symlink(&(0x7f0000000100)='\x00', 0x0) 00:37:56 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000140)='./file2\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f0000000240)='./file2\x00', 0x303a00, 0x0) 00:37:56 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='setgroups\x00') r2 = socket(0x2, 0x1, 0x0) dup3(r2, r1, 0x0) 00:37:56 executing program 1: mremap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000003000/0x1000)=nil) mremap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x3) 00:37:56 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000000080)="fb", 0x1, 0x0, 0x0, 0x0) recvfrom$unix(r1, &(0x7f0000000380)=""/242, 0xf2, 0x0, 0x0, 0x0) 00:37:57 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x135}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:37:57 executing program 3: perf_event_open(&(0x7f0000000000)={0x1000000002, 0x70, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@remote, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x80}}, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x0, @in6=@mcast1}}, 0xe4) r1 = socket$inet_udp(0x2, 0x2, 0x0) dup2(r1, r0) 00:37:57 executing program 5: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x12081ff) fcntl$setstatus(r0, 0x4, 0x6100) write$cgroup_type(r0, &(0x7f0000000200), 0xf642e7e) r2 = open(&(0x7f0000000040)='./file0\x00', 0x14b042, 0x0) r3 = open(&(0x7f0000000100)='./bus\x00', 0x1c1042, 0x0) write$P9_RREADLINK(r3, &(0x7f0000001740)=ANY=[], 0xe) fallocate(r3, 0x3, 0x0, 0xfffd) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r5 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fallocate(r5, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000240)={0x0, r0, 0x0, 0x1100}) [ 345.418530][ T25] kauditd_printk_skb: 96865 callbacks suppressed [ 345.418541][ T25] audit: type=1326 audit(1619743079.693:1890343): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 345.449351][ T25] audit: type=1326 audit(1619743079.703:1890344): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 345.473715][ T25] audit: type=1326 audit(1619743079.703:1890345): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 345.498771][ T25] audit: type=1326 audit(1619743079.703:1890346): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 345.523691][ T25] audit: type=1326 audit(1619743079.703:1890347): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 00:37:59 executing program 4: r0 = syz_io_uring_setup(0x7dc9, &(0x7f00000004c0)={0x0, 0x0, 0x2}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000300), &(0x7f0000000340)) io_uring_enter(r0, 0x0, 0x0, 0x5, 0x0, 0x0) 00:37:59 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$iso9660(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000000080)={[{@block={'block', 0x3d, 0x200}}]}) 00:37:59 executing program 3: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f000076f000/0x2000)=nil, 0x2000, 0x0, 0x616, 0x0) remap_file_pages(&(0x7f0000741000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4, 0x0, 0x0, 0x0) 00:37:59 executing program 5: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x12081ff) fcntl$setstatus(r0, 0x4, 0x6100) write$cgroup_type(r0, &(0x7f0000000200), 0xf642e7e) r2 = open(&(0x7f0000000040)='./file0\x00', 0x14b042, 0x0) r3 = open(&(0x7f0000000100)='./bus\x00', 0x1c1042, 0x0) write$P9_RREADLINK(r3, &(0x7f0000001740)=ANY=[], 0xe) fallocate(r3, 0x3, 0x0, 0xfffd) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r5 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fallocate(r5, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000240)={0x0, r0, 0x0, 0x1100}) 00:37:59 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="66530700ae897094e71b0fb1f147a8378f364602812c66538d750f6ee1d001f43f0500bb9fb045f2d1eaa302ab6c2fef2308003ea1315b9532f3af2f5e153eb78020fa00eb29880245ded4181a54ea1a9f7506516460be23e70c76eb09a55101e585e55fcde2dd6b077f74cf6f3237", 0x6f}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x4) [ 345.548626][ T25] audit: type=1326 audit(1619743079.703:1890348): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 345.573015][ T25] audit: type=1326 audit(1619743079.703:1890349): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 00:37:59 executing program 4: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x12081ff) fcntl$setstatus(r0, 0x4, 0x6100) write$cgroup_type(r0, &(0x7f0000000200), 0xf642e7e) r2 = open(&(0x7f0000000040)='./file0\x00', 0x14b042, 0x0) r3 = open(&(0x7f0000000100)='./bus\x00', 0x1c1042, 0x0) write$P9_RREADLINK(r3, &(0x7f0000001740)=ANY=[], 0xe) fallocate(r3, 0x3, 0x0, 0xfffd) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r5 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fallocate(r5, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000240)={0x0, r0, 0x0, 0x1100}) 00:37:59 executing program 3: shmctl$SHM_STAT_ANY(0x0, 0xf, 0x0) 00:37:59 executing program 1: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f0000000000)="02016300000001000000ff07000000ffffff82000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 345.611573][ T25] audit: type=1326 audit(1619743079.703:1890350): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 00:38:00 executing program 1: unshare(0x20060400) semtimedop(0x0, &(0x7f0000000000)=[{0x0, 0x0, 0x1800}], 0x1, 0x0) unshare(0x60400) [ 345.698541][ T25] audit: type=1326 audit(1619743079.703:1890351): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 345.725184][ T25] audit: type=1326 audit(1619743079.703:1890352): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 00:38:00 executing program 0: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/fscreate\x00', 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) writev(r0, &(0x7f0000001640)=[{&(0x7f0000000200)="f32167f0bfde12efad9ad75ce82833da244e1627ecda80ce9caf65d88b3ceb9ede682f2ef7d3c1a4c32139a3149473e52b4c417b79222a819d6197fa03c50d30c8ab3f79eda5c4f88e4806d660faa631ee7b14883ba5e93ad90a", 0x5a}], 0x1) 00:38:00 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(r0, 0x227a, &(0x7f0000000080)) 00:38:00 executing program 5: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x12081ff) fcntl$setstatus(r0, 0x4, 0x6100) write$cgroup_type(r0, &(0x7f0000000200), 0xf642e7e) r2 = open(&(0x7f0000000040)='./file0\x00', 0x14b042, 0x0) r3 = open(&(0x7f0000000100)='./bus\x00', 0x1c1042, 0x0) write$P9_RREADLINK(r3, &(0x7f0000001740)=ANY=[], 0xe) fallocate(r3, 0x3, 0x0, 0xfffd) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r5 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fallocate(r5, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000240)={0x0, r0, 0x0, 0x1100}) 00:38:00 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x16, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:38:00 executing program 4: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x12081ff) fcntl$setstatus(r0, 0x4, 0x6100) write$cgroup_type(r0, &(0x7f0000000200), 0xf642e7e) r2 = open(&(0x7f0000000040)='./file0\x00', 0x14b042, 0x0) r3 = open(&(0x7f0000000100)='./bus\x00', 0x1c1042, 0x0) write$P9_RREADLINK(r3, &(0x7f0000001740)=ANY=[], 0xe) fallocate(r3, 0x3, 0x0, 0xfffd) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r5 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fallocate(r5, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000240)={0x0, r0, 0x0, 0x1100}) [ 346.493455][T18984] SELinux: Context ó!gð¿Þï­š×\è(3Ú$N'ìڀΜ¯eØ‹<ëžÞh/.÷ÓÁ¤Ã!9£”så+LA{y"*a—úÅ0È«?yí¥ÄøŽHÖ`ú¦1î{ˆ;¥é:Ù is not valid (left unmapped). 00:38:00 executing program 3: madvise(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x2) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) madvise(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) 00:38:02 executing program 4: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x12081ff) fcntl$setstatus(r0, 0x4, 0x6100) write$cgroup_type(r0, &(0x7f0000000200), 0xf642e7e) r2 = open(&(0x7f0000000040)='./file0\x00', 0x14b042, 0x0) r3 = open(&(0x7f0000000100)='./bus\x00', 0x1c1042, 0x0) write$P9_RREADLINK(r3, &(0x7f0000001740)=ANY=[], 0xe) fallocate(r3, 0x3, 0x0, 0xfffd) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r5 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fallocate(r5, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000240)={0x0, r0, 0x0, 0x1100}) 00:38:02 executing program 0: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/fscreate\x00', 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) writev(r0, &(0x7f0000001640)=[{&(0x7f0000000200)="f32167f0bfde12efad9ad75ce82833da244e1627ecda80ce9caf65d88b3ceb9ede682f2ef7d3c1a4c32139a3149473e52b4c417b79222a819d6197fa03c50d30c8ab3f79eda5c4f88e4806d660faa631ee7b14883ba5e93ad90a", 0x5a}], 0x1) 00:38:02 executing program 1: perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = mq_open(&(0x7f00005a1ffb)='eth0\xd2', 0x42, 0x0, 0x0) ftruncate(r0, 0xa84) 00:38:02 executing program 3: madvise(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x2) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) madvise(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) 00:38:02 executing program 5: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x12081ff) fcntl$setstatus(r0, 0x4, 0x6100) write$cgroup_type(r0, &(0x7f0000000200), 0xf642e7e) r2 = open(&(0x7f0000000040)='./file0\x00', 0x14b042, 0x0) r3 = open(&(0x7f0000000100)='./bus\x00', 0x1c1042, 0x0) write$P9_RREADLINK(r3, &(0x7f0000001740)=ANY=[], 0xe) fallocate(r3, 0x3, 0x0, 0xfffd) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r5 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fallocate(r5, 0x0, 0x0, 0x4003fe) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000240)={0x0, r0, 0x0, 0x1100}) 00:38:02 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x26100d00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_netdev_private(r2, 0x894a, &(0x7f0000000000)) 00:38:02 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x26100d00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_netdev_private(r2, 0x894a, &(0x7f0000000000)) 00:38:02 executing program 3: madvise(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x2) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) madvise(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) 00:38:02 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x8165, 0x5) fallocate(r1, 0x0, 0x0, 0x801000) 00:38:02 executing program 0: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/fscreate\x00', 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) writev(r0, &(0x7f0000001640)=[{&(0x7f0000000200)="f32167f0bfde12efad9ad75ce82833da244e1627ecda80ce9caf65d88b3ceb9ede682f2ef7d3c1a4c32139a3149473e52b4c417b79222a819d6197fa03c50d30c8ab3f79eda5c4f88e4806d660faa631ee7b14883ba5e93ad90a", 0x5a}], 0x1) 00:38:02 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x26100d00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_netdev_private(r2, 0x894a, &(0x7f0000000000)) 00:38:03 executing program 3: madvise(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x2) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) madvise(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) 00:38:03 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="66530700ae897094e7b126b097eaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26f45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4ff15", 0x49}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 00:38:03 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x8165, 0x5) fallocate(r1, 0x0, 0x0, 0x801000) 00:38:03 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x26100d00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_netdev_private(r2, 0x894a, &(0x7f0000000000)) 00:38:03 executing program 0: r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/fscreate\x00', 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) writev(r0, &(0x7f0000001640)=[{&(0x7f0000000200)="f32167f0bfde12efad9ad75ce82833da244e1627ecda80ce9caf65d88b3ceb9ede682f2ef7d3c1a4c32139a3149473e52b4c417b79222a819d6197fa03c50d30c8ab3f79eda5c4f88e4806d660faa631ee7b14883ba5e93ad90a", 0x5a}], 0x1) 00:38:03 executing program 3: sysfs$2(0x2, 0x6, &(0x7f0000000040)=""/88) 00:38:03 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000740), 0x0, 0x0) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000040)={0x0, 0x0, 0xfffffffd, 0x0, 0x0, "7102939b00bb4d3c66b3a2a7aa552ace4a28cb"}) 00:38:03 executing program 2: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/cgroup\x00') 00:38:03 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) sched_setattr(0x0, 0x0, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x2, 0x0, 0x0, 0x1}, 0x0) r3 = gettid() r4 = creat(&(0x7f0000000240)='./file0\x00', 0x19) write$binfmt_script(r4, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x141) prctl$PR_SET_PTRACER(0x59616d61, r3) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0xefffffffffffffff, 0xffffffffffffffff, 0x0) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) 00:38:03 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback={0xfec0ffff00000000}}, 0x1c) 00:38:03 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f00000008c0)=[{{&(0x7f00000002c0)={0xa, 0x4e20, 0x0, @local}, 0x1c, 0x0}}, {{&(0x7f0000000840)={0xa, 0x4e24, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000ac0)=[@dontfrag={{0x10, 0x29, 0x3e, 0x57}}], 0x10}}], 0x2, 0x0) 00:38:03 executing program 0: mlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x4) 00:38:03 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x8165, 0x5) fallocate(r1, 0x0, 0x0, 0x801000) 00:38:03 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x154, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@rand_addr=' \x01\x00'}, {@in6=@mcast2, 0x0, 0x32}, @in6=@rand_addr=' \x01\x00', {}, {}, {}, 0x0, 0x0, 0xa, 0x4}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @encap={0x1c, 0x4, {0x2, 0x0, 0x0, @in=@multicast1}}]}, 0x154}}, 0x0) 00:38:03 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="66530700ae897094e71b0fb1f14701ffffffffffffff66538d750f6ee1d001093f136318ffd6caefe5a73f0500ab783c7d5dbb9fb245f2d1eaa3ca203640e3e1c7f9cf6d2223d569b6fe53fd32283d7628e90f21c8c43e99720ed72373a3e96ccd9a517752e54a9776e8d92c8cca06f571199725b26547f8ff103ad731ab11da4b049fbb92", 0x85}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 00:38:03 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f00000008c0)=[{{&(0x7f00000002c0)={0xa, 0x4e20, 0x0, @local}, 0x1c, 0x0}}, {{&(0x7f0000000840)={0xa, 0x4e24, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000ac0)=[@dontfrag={{0x10, 0x29, 0x3e, 0x57}}], 0x10}}], 0x2, 0x0) 00:38:03 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x8165, 0x5) fallocate(r1, 0x0, 0x0, 0x801000) 00:38:03 executing program 0: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000180)={'lo\x00', @ifru_addrs=@xdp}) 00:38:03 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f00000008c0)=[{{&(0x7f00000002c0)={0xa, 0x4e20, 0x0, @local}, 0x1c, 0x0}}, {{&(0x7f0000000840)={0xa, 0x4e24, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000ac0)=[@dontfrag={{0x10, 0x29, 0x3e, 0x57}}], 0x10}}], 0x2, 0x0) 00:38:03 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='timerslack_ns\x00') pread64(r0, &(0x7f00000001c0)=""/102400, 0x19000, 0x8962) 00:38:04 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/raw\x00') pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0xda9) 00:38:04 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000880), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x80041285, 0xc04a01) 00:38:04 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$unix(r0, 0x0, 0x0, 0x0) 00:38:04 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f00000008c0)=[{{&(0x7f00000002c0)={0xa, 0x4e20, 0x0, @local}, 0x1c, 0x0}}, {{&(0x7f0000000840)={0xa, 0x4e24, 0x0, @private2}, 0x1c, 0x0, 0x0, &(0x7f0000000ac0)=[@dontfrag={{0x10, 0x29, 0x3e, 0x57}}], 0x10}}], 0x2, 0x0) 00:38:04 executing program 3: r0 = fsopen(&(0x7f0000000000)='selinuxfs\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f0000000040)='source', &(0x7f0000000080)='\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, &(0x7f00000000c0)='source', &(0x7f0000000100)='source', 0x0) 00:38:04 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = getpgid(0x0) sendmsg$netlink(r0, &(0x7f0000000640)={&(0x7f0000000000), 0x8, &(0x7f0000000580)=[{&(0x7f0000000080)={0x10}, 0x10}], 0x1, &(0x7f0000000600)=[@cred={{0x1c, 0x1, 0x2, {r1}}}], 0x20}, 0x0) 00:38:04 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x0, 0x0) symlinkat(&(0x7f00000000c0)='/', r0, &(0x7f0000d06ff8)='./file0\x00') chmod(&(0x7f00000001c0)='./file0\x00', 0x0) 00:38:04 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setuid(0xee01) sendmmsg$sock(r0, &(0x7f0000002e40)=[{{&(0x7f0000000080)=@in6={0xa, 0x4e23, 0x0, @mcast1}, 0x80, 0x0, 0x0, &(0x7f0000000200)=[@mark={{0x14}}], 0x18}}], 0x1, 0x0) 00:38:04 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x0, 0x0) symlinkat(&(0x7f00000000c0)='/', r0, &(0x7f0000d06ff8)='./file0\x00') chmod(&(0x7f00000001c0)='./file0\x00', 0x0) 00:38:04 executing program 2: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmmsg$inet(r0, &(0x7f0000003680)=[{{0x0, 0x0, &(0x7f00000001c0)=[{0x0}, {&(0x7f0000000180)='7', 0x1}], 0x2, &(0x7f0000000200)=[@ip_tos_u8={{0x11}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @dev}}}], 0x38}}], 0x1, 0x0) 00:38:04 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x541b, 0x0) 00:38:04 executing program 5: r0 = fsopen(&(0x7f0000000080)='devpts\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x0, &(0x7f0000000040)='silent\x00', 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) 00:38:04 executing program 3: r0 = socket(0x400000000010, 0x3, 0x0) recvmmsg(r0, &(0x7f0000007ec0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000340)=0x4, 0x4) write(r0, &(0x7f0000000040)="3a03000012002551075c0165ff0ffc02802000030004000500e1000c1e0309001a03a000", 0x33a) 00:38:04 executing program 4: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x400c0c0, &(0x7f00000000c0)={0x2, 0x0, @rand_addr=0x64010100}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0xfe7a, 0x810, &(0x7f00000001c0), 0x10) [ 350.004441][T19172] devpts: called with bogus options 00:38:04 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x0, 0x0) symlinkat(&(0x7f00000000c0)='/', r0, &(0x7f0000d06ff8)='./file0\x00') chmod(&(0x7f00000001c0)='./file0\x00', 0x0) 00:38:04 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x400000000000010, 0x802, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000100)=0xc) r3 = socket(0x1, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setreuid(0x0, r4) setresuid(r4, 0x0, r2) 00:38:04 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/softnet_stat\x00') r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000ac0)='ns/time_for_children\x00') copy_file_range(r1, 0x0, r0, 0x0, 0x0, 0x8008) 00:38:04 executing program 5: syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000000)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0, 0x0, 0xfffffffffffffffd}], 0x0, &(0x7f0000000400)=ANY=[]) chdir(&(0x7f0000000340)='./file0\x00') open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) symlink(&(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)='./file0\x00') 00:38:04 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='cpuset\x00', 0x0, 0x0) chdir(&(0x7f0000000480)='./file0\x00') r0 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000240)='cpuset.mems\x00', 0x2, 0x0) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000100)='0', 0x1}, {0x0}, {&(0x7f0000000180)="334f9d28ec72124c9a88a72c4c71097d4d057f603bcea5add6255c80fa995d67994bf01da2226d88df3d0fe032ec35e319c2c83f07fa13c5bd6c3891e83955fc509c83353ed81e9ec2d338cbb68e70136abd867fc96bd3bbfc0a88536d2fd01767d6b9d1c274409193a771", 0x6b}], 0x3) 00:38:04 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x1aa}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x5) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) exit_group(0x0) 00:38:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet(r1, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000000)=[@mss, @timestamp, @window, @mss, @window, @window], 0x200002d4) 00:38:04 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x0, 0x0) symlinkat(&(0x7f00000000c0)='/', r0, &(0x7f0000d06ff8)='./file0\x00') chmod(&(0x7f00000001c0)='./file0\x00', 0x0) [ 350.106516][T19191] loop5: detected capacity change from 0 to 16383 [ 350.118045][T19199] new mount options do not match the existing superblock, will be ignored [ 350.128471][T19199] new mount options do not match the existing superblock, will be ignored 00:38:04 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r0, 0x0, 0x8003, 0x8020001) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r3, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000200)={0x0, r3}) r4 = syz_open_dev$evdev(&(0x7f00000002c0), 0x0, 0x42002) ioctl$EVIOCREVOKE(r4, 0x40044591, 0x0) write$evdev(r4, 0x0, 0x0) 00:38:04 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x99, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x4, 0x0, 0x1000}, 0xffffffffffffffff, 0xa, r0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x4b, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x2402, 0x0) r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x4b}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x2402, 0x0) r5 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x2402, 0x0) 00:38:04 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvfrom(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=@ieee802154={0x24, @long}, 0x550000) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)={0x14, 0x4, 0x1, 0x101}, 0x14}}, 0x0) 00:38:04 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='pagemap\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x3000002, 0x4d032, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 00:38:04 executing program 1: syz_mount_image$iso9660(&(0x7f00000004c0), &(0x7f0000000500)='./file1\x00', 0x0, 0x0, &(0x7f0000000800), 0x0, &(0x7f0000000880)={[{@hide}]}) 00:38:04 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1, &(0x7f0000001100)=[&(0x7f00000010c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f00000000c0)="b2", 0x1}]) 00:38:04 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x99, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x4, 0x0, 0x1000}, 0xffffffffffffffff, 0xa, r0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x4b, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x2402, 0x0) r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x4b}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x2402, 0x0) r5 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x2402, 0x0) 00:38:04 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x99, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x4, 0x0, 0x1000}, 0xffffffffffffffff, 0xa, r0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x4b, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x2402, 0x0) r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x4b}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x2402, 0x0) r5 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x2402, 0x0) 00:38:04 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='pagemap\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x3000002, 0x4d032, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 00:38:04 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r0, 0x0, 0x8003, 0x8020001) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r3, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000200)={0x0, r3}) r4 = syz_open_dev$evdev(&(0x7f00000002c0), 0x0, 0x42002) ioctl$EVIOCREVOKE(r4, 0x40044591, 0x0) write$evdev(r4, 0x0, 0x0) 00:38:04 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x99, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x4, 0x0, 0x1000}, 0xffffffffffffffff, 0xa, r0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x4b, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x2402, 0x0) r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x4b}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x2402, 0x0) r5 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x2402, 0x0) 00:38:04 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x99, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x4, 0x0, 0x1000}, 0xffffffffffffffff, 0xa, r0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x4b, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x2402, 0x0) r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x4b}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x2402, 0x0) r5 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x2402, 0x0) 00:38:04 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x10, 0x803, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x39, &(0x7f0000000000), 0x20000000) 00:38:04 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1, &(0x7f0000001100)=[&(0x7f00000010c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f00000000c0)="b2", 0x1}]) 00:38:04 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='pagemap\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x3000002, 0x4d032, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 00:38:04 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x99, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x4, 0x0, 0x1000}, 0xffffffffffffffff, 0xa, r0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x4b, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x2402, 0x0) r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x4b}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x2402, 0x0) r5 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x2402, 0x0) 00:38:04 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r0, 0x0, 0x8003, 0x8020001) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r3, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000200)={0x0, r3}) r4 = syz_open_dev$evdev(&(0x7f00000002c0), 0x0, 0x42002) ioctl$EVIOCREVOKE(r4, 0x40044591, 0x0) write$evdev(r4, 0x0, 0x0) [ 350.446952][ T25] kauditd_printk_skb: 76264 callbacks suppressed [ 350.446965][ T25] audit: type=1326 audit(1619743084.724:1966617): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 00:38:04 executing program 3: sched_setattr(0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000000)='./file1\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0), 0xd4ba0ff) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x1000baa) rename(&(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='./file0/file1\x00') lchown(&(0x7f00000001c0)='./file1\x00', 0xee00, 0x0) 00:38:04 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x10, 0x803, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x39, &(0x7f0000000000), 0x20000000) [ 350.508273][ T25] audit: type=1326 audit(1619743084.724:1966618): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 00:38:04 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='pagemap\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x3000002, 0x4d032, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000e3e000)=""/8, 0xffd8, 0x103f00) 00:38:04 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x10, 0x803, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x39, &(0x7f0000000000), 0x20000000) 00:38:04 executing program 0: r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r0, 0x0, 0x8003, 0x8020001) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r3, &(0x7f0000000280), 0x1033b) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000200)={0x0, r3}) r4 = syz_open_dev$evdev(&(0x7f00000002c0), 0x0, 0x42002) ioctl$EVIOCREVOKE(r4, 0x40044591, 0x0) write$evdev(r4, 0x0, 0x0) 00:38:04 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1, &(0x7f0000001100)=[&(0x7f00000010c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f00000000c0)="b2", 0x1}]) 00:38:04 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x99, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x4, 0x0, 0x1000}, 0xffffffffffffffff, 0xa, r0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x4b, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x2402, 0x0) r4 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x4b}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x2402, 0x0) r5 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x2402, 0x0) 00:38:04 executing program 4: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x20040, 0x0) open_by_handle_at(r0, &(0x7f0000000180)=ANY=[@ANYRES32=r0], 0x0) [ 350.617856][ T25] audit: type=1326 audit(1619743084.724:1966619): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 00:38:05 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket(0x10, 0x803, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x39, &(0x7f0000000000), 0x20000000) 00:38:05 executing program 4: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x20040, 0x0) open_by_handle_at(r0, &(0x7f0000000180)=ANY=[@ANYRES32=r0], 0x0) 00:38:05 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) rt_sigprocmask(0x1, &(0x7f0000000040), &(0x7f0000000080), 0x8) 00:38:05 executing program 5: io_setup(0x5, &(0x7f00000000c0)=0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) io_submit(r0, 0x1, &(0x7f0000000500)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0, 0xf0ff7f}]) [ 350.731762][ T25] audit: type=1326 audit(1619743084.724:1966620): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 350.797012][ T25] audit: type=1326 audit(1619743084.724:1966621): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 350.823343][ T25] audit: type=1326 audit(1619743084.724:1966622): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 350.848740][ T25] audit: type=1326 audit(1619743084.724:1966623): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 350.877745][ T25] audit: type=1326 audit(1619743084.724:1966624): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 350.902579][ T25] audit: type=1326 audit(1619743084.724:1966625): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 350.927266][ T25] audit: type=1326 audit(1619743084.724:1966626): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 00:38:05 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000140), r0) sendmsg$NLBL_UNLABEL_C_STATICADD(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="49880000000000000000030000002600070073797374656d5f753a6f626a3a63745f783a667361646d5f657865635f743a733000000014000600766c616e3000000000000000000000000800050000000000080004"], 0x60}}, 0x0) 00:38:05 executing program 1: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0) futex(&(0x7f000000cffc)=0x1, 0x8b, 0x1, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0x8c, 0x1, 0x0, &(0x7f0000048000)=0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) tkill(r0, 0x1000000000015) 00:38:05 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1, &(0x7f0000001100)=[&(0x7f00000010c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f00000000c0)="b2", 0x1}]) 00:38:05 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) mmap(&(0x7f0000000000/0x2000)=nil, 0x30000, 0x2, 0x11, r0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f000000a240)={0x0, 0x3938700}) r1 = gettid() process_vm_writev(r1, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x3de, &(0x7f0000c22fa0)=[{&(0x7f0000000040)=""/15, 0x2d77744}], 0x1, 0x0) 00:38:05 executing program 4: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x20040, 0x0) open_by_handle_at(r0, &(0x7f0000000180)=ANY=[@ANYRES32=r0], 0x0) 00:38:05 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_int(r1, 0x29, 0x21, &(0x7f0000000300)=0xfffff000, 0x4) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000040)="ff0204000000000100000000000000000000000000000205", 0x18) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @private2}, 0x1c) 00:38:05 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_int(r1, 0x29, 0x21, &(0x7f0000000300)=0xfffff000, 0x4) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000040)="ff0204000000000100000000000000000000000000000205", 0x18) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @private2}, 0x1c) 00:38:05 executing program 4: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x20040, 0x0) open_by_handle_at(r0, &(0x7f0000000180)=ANY=[@ANYRES32=r0], 0x0) 00:38:05 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000004300)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000100)=0x3) write(r1, &(0x7f00000001c0)="01", 0xfdef) 00:38:05 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_ABORT_SCAN(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r1, 0x1, 0x0, 0x0, {{0x1a}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) 00:38:05 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_int(r1, 0x29, 0x21, &(0x7f0000000300)=0xfffff000, 0x4) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000040)="ff0204000000000100000000000000000000000000000205", 0x18) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @private2}, 0x1c) 00:38:05 executing program 4: r0 = fsopen(&(0x7f0000000000)='tmpfs\x00', 0x0) readv(r0, &(0x7f00000001c0)=[{&(0x7f0000000040)=""/7, 0x7}], 0x1) 00:38:05 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) 00:38:05 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) set_mempolicy(0x4002, &(0x7f0000000080)=0x2, 0x101) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) 00:38:05 executing program 5: r0 = socket$inet6(0xa, 0x802, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_int(r1, 0x29, 0x21, &(0x7f0000000300)=0xfffff000, 0x4) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000040)="ff0204000000000100000000000000000000000000000205", 0x18) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @private2}, 0x1c) [ 351.312514][T19360] new mount options do not match the existing superblock, will be ignored [ 351.327213][T19365] new mount options do not match the existing superblock, will be ignored 00:38:05 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) mmap(&(0x7f0000000000/0x2000)=nil, 0x30000, 0x2, 0x11, r0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f000000a240)={0x0, 0x3938700}) r1 = gettid() process_vm_writev(r1, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x3de, &(0x7f0000c22fa0)=[{&(0x7f0000000040)=""/15, 0x2d77744}], 0x1, 0x0) 00:38:05 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xe7, &(0x7f0000000440)="c4c691019919da078a0098d1e0a593b040f7629100f06ee04fa4ea57ff22ea97be19af3dcba01419cd2386ad59157689c9c6a47312334c2a97ac2b7f0fb4aabebae8dc5dffbcd48a70502173d6efa56b60f48cf0c9d0989ecbbfc220bd2b39df9ad8d6b14910f4a869863009780dd6e673a02f7ed829932929af9dffb1fa2cd7328202ac55f4f5dbb8494120f79d5f60958691a8a3fcf561c33f46ab89803f47d97e04f7bf9cafb006ae29480408c8380cf060dd72462ccc5b7d195a113bc539df6591cd574a02d4d9b9f3ebce31bd7582018ded8ceb71e75417dabc45f9fa0503befdcd0874ae"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x34) 00:38:05 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) r1 = open(&(0x7f0000000080)='./file0/file0\x00', 0x121140, 0x0) fstat(r1, &(0x7f0000003100)) 00:38:05 executing program 1: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x7fb}, 0x10) write(r0, &(0x7f000018efdc)="240000005a001f0214f9f407000904fcffffff1010000400feffffff0800000000000000", 0x24) 00:38:05 executing program 2: mkdir(&(0x7f0000000400)='./file1\x00', 0x0) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file1\x00', &(0x7f0000000480)='system.posix_acl_default\x00', &(0x7f0000000300)=ANY=[@ANYBLOB="020000000100000000000000040000000000000020"], 0x1c, 0x0) creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) 00:38:05 executing program 5: setreuid(0x0, 0xee00) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = fork() move_pages(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 00:38:05 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xe7, &(0x7f0000000440)="c4c691019919da078a0098d1e0a593b040f7629100f06ee04fa4ea57ff22ea97be19af3dcba01419cd2386ad59157689c9c6a47312334c2a97ac2b7f0fb4aabebae8dc5dffbcd48a70502173d6efa56b60f48cf0c9d0989ecbbfc220bd2b39df9ad8d6b14910f4a869863009780dd6e673a02f7ed829932929af9dffb1fa2cd7328202ac55f4f5dbb8494120f79d5f60958691a8a3fcf561c33f46ab89803f47d97e04f7bf9cafb006ae29480408c8380cf060dd72462ccc5b7d195a113bc539df6591cd574a02d4d9b9f3ebce31bd7582018ded8ceb71e75417dabc45f9fa0503befdcd0874ae"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x34) 00:38:05 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000), 0x0, &(0x7f0000000080)={[{@mpol={'mpol', 0x3d, {'prefer', '=relative', @val={0x2c}}}, 0xa}]}) [ 351.434027][T19381] netlink: 'syz-executor.1': attribute type 4 has an invalid length. 00:38:05 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) r1 = open(&(0x7f0000000080)='./file0/file0\x00', 0x121140, 0x0) fstat(r1, &(0x7f0000003100)) 00:38:05 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000), 0x0, &(0x7f0000000080)={[{@mpol={'mpol', 0x3d, {'prefer', '=relative', @val={0x2c}}}, 0xa}]}) 00:38:05 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000000000000025000000040016000c0001000000001f00000606040000000000000000", 0x39}], 0x1) 00:38:05 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x172, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$MON_IOCG_STATS(0xffffffffffffffff, 0x80089203, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) setregid(0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f", 0xf, 0x1000}, {&(0x7f0000010500)="ffff000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000001280)=ANY=[@ANYBLOB="0081ccdbf51178f5f9b7516c64606816d39cbb0e213894b84dbc7ccc030050d0cf80bf29c8e123608b"]) setxattr$trusted_overlay_upper(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f0000003080)=ANY=[], 0xc001, 0x0) [ 351.477762][T19395] netlink: 'syz-executor.1': attribute type 4 has an invalid length. [ 351.502116][T19397] tmpfs: Bad value for 'mpol' [ 351.565188][T19411] tmpfs: Bad value for 'mpol' [ 351.573432][T19410] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.5'. 00:38:05 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) mmap(&(0x7f0000000000/0x2000)=nil, 0x30000, 0x2, 0x11, r0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f000000a240)={0x0, 0x3938700}) r1 = gettid() process_vm_writev(r1, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x3de, &(0x7f0000c22fa0)=[{&(0x7f0000000040)=""/15, 0x2d77744}], 0x1, 0x0) 00:38:05 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xe7, &(0x7f0000000440)="c4c691019919da078a0098d1e0a593b040f7629100f06ee04fa4ea57ff22ea97be19af3dcba01419cd2386ad59157689c9c6a47312334c2a97ac2b7f0fb4aabebae8dc5dffbcd48a70502173d6efa56b60f48cf0c9d0989ecbbfc220bd2b39df9ad8d6b14910f4a869863009780dd6e673a02f7ed829932929af9dffb1fa2cd7328202ac55f4f5dbb8494120f79d5f60958691a8a3fcf561c33f46ab89803f47d97e04f7bf9cafb006ae29480408c8380cf060dd72462ccc5b7d195a113bc539df6591cd574a02d4d9b9f3ebce31bd7582018ded8ceb71e75417dabc45f9fa0503befdcd0874ae"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x34) 00:38:05 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000), 0x0, &(0x7f0000000080)={[{@mpol={'mpol', 0x3d, {'prefer', '=relative', @val={0x2c}}}, 0xa}]}) 00:38:05 executing program 1: open(0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000700)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x42000) listen(r0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x4) writev(r2, &(0x7f00000004c0)=[{&(0x7f0000000200)="a10100001400add427323b470c45b4560a067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe8090000f0ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200", 0x55}, {&(0x7f0000000580)="5f7369196ebfc7b64566ef4db5bc75128b2ac039548f5b55b20bff5aca0ba0705f7c60223487fd011ff5cdc5cf09c7c72ae361ed24a970c375eb9ea0ce4705c466015af30d316ca361ad1f7f6699f76de04920d9e8175a754469b8bc201018ee6827357d7b7b8736125dd159724f8445bed833b05dbbca86d7f9439d0202589f68296bd63837f58392ce19b5678a371b00f3f1097bd56393f4f2367a67fc9f3e1f4346443d68d7017e39f873cc64a913b9ba6d8827bf6204e2fb6150ef1617baeb74b0ce6e126ec26df35598961c622955630055268963da63fe95149a3f6e562099a1a5f414860af546f46a213d043fd54729581a4e36", 0xf7}, {&(0x7f0000000680)="4aea004f4bf5f25f5d6dd171231cc269f535453b065935c45ce6e05ae9bdd39a1149fad015f90f9d38830dfe76de0a912ec9bee1b7d0c531466f4992fef62dc0b3fde27218aaa1f510857f92339be52ff81194b20f", 0x55}], 0x3) 00:38:05 executing program 5: prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000551000/0x3000)=nil) pkey_mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pkey_mprotect(&(0x7f0000800000/0x800000)=nil, 0x800000, 0xe, 0xffffffffffffffff) 00:38:05 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) r1 = open(&(0x7f0000000080)='./file0/file0\x00', 0x121140, 0x0) fstat(r1, &(0x7f0000003100)) 00:38:06 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000), 0x0, &(0x7f0000000080)={[{@mpol={'mpol', 0x3d, {'prefer', '=relative', @val={0x2c}}}, 0xa}]}) 00:38:06 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff}) set_mempolicy(0x1, 0x0, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) clock_gettime(0x0, &(0x7f0000000240)) ppoll(&(0x7f00000001c0)=[{r2}, {0xffffffffffffffff, 0x80c8}, {r1, 0x80}, {r3}, {r4}, {0xffffffffffffffff, 0x20}, {r0, 0xb000}], 0x7, 0x0, 0x0, 0x0) 00:38:06 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) r3 = msgget$private(0x0, 0x745) msgrcv(r3, 0x0, 0x1008, 0x0, 0x0) fork() msgctl$IPC_SET(r3, 0x1, &(0x7f0000000140)={{0x2, 0x0, 0xee00, 0x0, 0xee01}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}) [ 351.749088][T19431] tmpfs: Bad value for 'mpol' 00:38:06 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xe7, &(0x7f0000000440)="c4c691019919da078a0098d1e0a593b040f7629100f06ee04fa4ea57ff22ea97be19af3dcba01419cd2386ad59157689c9c6a47312334c2a97ac2b7f0fb4aabebae8dc5dffbcd48a70502173d6efa56b60f48cf0c9d0989ecbbfc220bd2b39df9ad8d6b14910f4a869863009780dd6e673a02f7ed829932929af9dffb1fa2cd7328202ac55f4f5dbb8494120f79d5f60958691a8a3fcf561c33f46ab89803f47d97e04f7bf9cafb006ae29480408c8380cf060dd72462ccc5b7d195a113bc539df6591cd574a02d4d9b9f3ebce31bd7582018ded8ceb71e75417dabc45f9fa0503befdcd0874ae"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x34) 00:38:06 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) r1 = open(&(0x7f0000000080)='./file0/file0\x00', 0x121140, 0x0) fstat(r1, &(0x7f0000003100)) 00:38:06 executing program 2: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) mkdirat(r0, &(0x7f0000001400)='./file1\x00', 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000001c0)={0x0, 0x80000001, 0x2000000}) [ 351.839625][T19446] tmpfs: Bad value for 'mpol' 00:38:06 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x67) mmap(&(0x7f0000000000/0x2000)=nil, 0x30000, 0x2, 0x11, r0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f000000a240)={0x0, 0x3938700}) r1 = gettid() process_vm_writev(r1, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x3de, &(0x7f0000c22fa0)=[{&(0x7f0000000040)=""/15, 0x2d77744}], 0x1, 0x0) 00:38:06 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/rt_cache\x00') lseek(r0, 0x7, 0x0) 00:38:06 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1000000000022, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) recvmmsg(r0, &(0x7f0000000c80)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/121, 0x79}], 0x1}}], 0x1, 0x0, 0x0) sendmmsg(r0, &(0x7f0000004f40)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000240)='\a', 0x1}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x24044075) 00:38:06 executing program 1: r0 = socket$inet(0x10, 0x80003, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="24000000210007041dfffd946f610500020000e8fe0208010001080008000600fe7f0000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 351.948427][T19457] loop2: detected capacity change from 0 to 87 00:38:06 executing program 2: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) mkdirat(r0, &(0x7f0000001400)='./file1\x00', 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000001c0)={0x0, 0x80000001, 0x2000000}) 00:38:06 executing program 3: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) r1 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_int(r0, 0x0, 0x19, &(0x7f0000000000)=0x85f, 0x4) recvmmsg(r0, &(0x7f0000006280)=[{{0x0, 0x0, 0x0}}], 0x1, 0x22, 0x0) [ 352.030245][T19474] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 352.088037][T19480] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 00:38:06 executing program 1: unshare(0x600) r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000480)='ns/mnt\x00') setns(r0, 0x0) unshare(0x20000000) clone(0x70224100, 0x0, 0x0, 0x0, 0x0) [ 352.162504][T19490] loop2: detected capacity change from 0 to 87 00:38:06 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, &(0x7f0000000180)=[{&(0x7f00000000c0)="53000000fcffffff210000000200020000009600000000000000a40000000000348a67b68c4cc357f70d748bc0ec6c000000001bff7f0000dcda8f60dd1685812c76d61bd85f96051133e085e09d08b7dc5c1e23966250ec", 0x58}], 0x1) read(r0, 0x0, 0x0) 00:38:06 executing program 3: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) r1 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_int(r0, 0x0, 0x19, &(0x7f0000000000)=0x85f, 0x4) recvmmsg(r0, &(0x7f0000006280)=[{{0x0, 0x0, 0x0}}], 0x1, 0x22, 0x0) 00:38:06 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cpuset\x00', 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000000c0)='tasks\x00', 0x2, 0x0) r2 = inotify_init1(0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r4) fcntl$setown(r2, 0x8, 0xffffffffffffffff) fcntl$getownex(r2, 0x10, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_pid(r1, &(0x7f0000000100)=r5, 0x12) 00:38:06 executing program 2: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) mkdirat(r0, &(0x7f0000001400)='./file1\x00', 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000001c0)={0x0, 0x80000001, 0x2000000}) 00:38:06 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000480)=0x2, 0x4) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000300)=[@sack_perm], 0x1) sendto$inet(r0, &(0x7f0000000000)='X', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000140)=[@mss], 0x20000000000002f7) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88) sendto$inet(r0, &(0x7f00000004c0)='4', 0x1, 0x805, 0x0, 0x0) 00:38:06 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) socket$inet6(0xa, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000002bc0), 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000040)={0x0, @broadcast, 0x0, 0x400002, 'rr\x00'}, 0x2c) mount(0x0, &(0x7f0000000240)='.\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) 00:38:07 executing program 2: r0 = syz_mount_image$msdos(&(0x7f0000000040), &(0x7f00000000c0)='./file1\x00', 0xaea1, 0x1, &(0x7f0000000300)=[{&(0x7f0000000140)="040005090000000066617400040409000200027400f801", 0x17}], 0x0, &(0x7f0000000080)=ANY=[]) mkdirat(r0, &(0x7f0000001400)='./file1\x00', 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000001c0)={0x0, 0x80000001, 0x2000000}) 00:38:07 executing program 3: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) r1 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_int(r0, 0x0, 0x19, &(0x7f0000000000)=0x85f, 0x4) recvmmsg(r0, &(0x7f0000006280)=[{{0x0, 0x0, 0x0}}], 0x1, 0x22, 0x0) 00:38:07 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r2 = socket(0x10, 0x3, 0x0) write(r2, &(0x7f00000000c0)="240000001e005f0214fffffffffffff8070000000000000000000000080008000d000000", 0x24) [ 352.722013][T19513] loop2: detected capacity change from 0 to 87 [ 352.752623][T19520] new mount options do not match the existing superblock, will be ignored 00:38:07 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="4c0000000104010100000000000000000200000205000100020000000800054000000009060006"], 0x4c}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x447fe5, 0x0) 00:38:07 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000000100)=[{0x6}]}, 0x10) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, &(0x7f0000000340)=0x101, 0x4) close(r0) 00:38:07 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={0x0, @sco={0x1f, @none}, @ethernet={0x0, @multicast}, @isdn, 0x0, 0x0, 0x0, 0xf00}) 00:38:07 executing program 3: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) r1 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) setsockopt$inet_int(r0, 0x0, 0x19, &(0x7f0000000000)=0x85f, 0x4) recvmmsg(r0, &(0x7f0000006280)=[{{0x0, 0x0, 0x0}}], 0x1, 0x22, 0x0) 00:38:07 executing program 1: r0 = syz_io_uring_setup(0x75cc, &(0x7f0000000300), &(0x7f0000ffd000/0x1000)=nil, &(0x7f00006d6000/0x2000)=nil, &(0x7f0000000180), &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) write$nbd(r2, &(0x7f00000001c0)=ANY=[], 0x10) dup2(r0, r1) 00:38:07 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x21, 0x0, 0x0) 00:38:07 executing program 5: socketpair(0x2, 0x3, 0x8, 0x0) [ 352.908601][T19551] loop2: detected capacity change from 0 to 87 [ 352.922642][T19554] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.0'. 00:38:07 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000200000006000000000008000080000020000000d6f4655fd6f4655f0100ffff53ef010001000000d5f4655f000000000000000001000000000000000b0000000001000008000000d24201001283", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000441356bbe0d347458781d90fbb6137b4010040", 0x1f, 0x4e0}, {&(0x7f0000010300)="03", 0x1, 0x640}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000d5f4655fd6f4655fd6f4655f000000000000040080", 0x1d, 0x4100}, {&(0x7f0000012800)="8081000000180000d5f4655fd5f4655fd5f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4200}, {0x0}, {&(0x7f0000013900)="111fc0d9", 0x4, 0x30000}], 0x0, &(0x7f00000005c0)=ANY=[]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 00:38:07 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x47, &(0x7f00000005c0)="c4c691019919da078a0098d1e0a593b040f762910000ee0d6333b5cacd893169b618322ff6602020511253508b728c2a46e1bc3c0e29b9ab9b7136283e350808ffdb2dbea79109"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd", 0x44}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x40) 00:38:07 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffe}]}) clone(0x80040300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xfe, &(0x7f00000002c0)="c4c691019919da078a0098d1e0a593b040f762910000000000000022addee07bee0d6333b5cacd891fa870d434223169b618322ff6602022511253508b5a4496728c2a46e1bc340e29b9ab9b7136283e350808ffdb2dbea7410b36000000007baa17dacdcfac32957dc8bb44e203c4b1bc83d8c0b29f75bcf2e3482945fef116371f8c8c0c4db583a208718e3cccd9dd3bf7a0132044681400bf30024514a6d2675bab926125c43083e773eb3d8dea74700066ee70c42196645292c0e4c3622c102a16be9066fc27e7d4466cbb295eb7f286dcccfde0740cb90366fdd064888fc176574bd977c8c7ef316262a70e75001b11c7c49ae8797518e425ef9080"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x40) 00:38:07 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x7) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) r1 = gettid() tkill(r1, 0x3c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) ptrace$setregs(0xf, r1, 0x3f, &(0x7f0000000140)) 00:38:07 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@dev, @in6=@dev, 0x0, 0x7, 0x0, 0x0, 0xa, 0x20, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@private2, 0x0, 0x33}, 0x0, @in6=@remote}}, 0xe8) sendmmsg$inet6(r2, &(0x7f0000000180)=[{{&(0x7f0000000040)={0xa, 0x4ea3, 0x0, @remote}, 0x5e, 0x0}}], 0x1, 0x0) [ 353.084301][T19574] loop2: detected capacity change from 0 to 4096 [ 353.136306][T19574] EXT4-fs warning (device loop2): ext4_enable_quotas:6442: Failed to enable quota tracking (type=0, err=-22). Please run e2fsck to fix. [ 353.151905][T19574] EXT4-fs (loop2): mount failed 00:38:07 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="4c0000000104010100000000000000000200000205000100020000000800054000000009060006"], 0x4c}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x447fe5, 0x0) 00:38:07 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffe}]}) clone(0x80040300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xfe, &(0x7f00000002c0)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x40) 00:38:07 executing program 1: r0 = syz_io_uring_setup(0x75cc, &(0x7f0000000300), &(0x7f0000ffd000/0x1000)=nil, &(0x7f00006d6000/0x2000)=nil, &(0x7f0000000180), &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) write$nbd(r2, &(0x7f00000001c0)=ANY=[], 0x10) dup2(r0, r1) 00:38:07 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@dev, @in6=@dev, 0x0, 0x7, 0x0, 0x0, 0xa, 0x20, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@private2, 0x0, 0x33}, 0x0, @in6=@remote}}, 0xe8) sendmmsg$inet6(r2, &(0x7f0000000180)=[{{&(0x7f0000000040)={0xa, 0x4ea3, 0x0, @remote}, 0x5e, 0x0}}], 0x1, 0x0) 00:38:07 executing program 2: r0 = syz_io_uring_setup(0x6ad4, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000140)=0x0) set_mempolicy(0x2, &(0x7f00000001c0)=0x1, 0x8000) open(&(0x7f0000000000)='./bus\x00', 0x103042, 0x0) r3 = open(&(0x7f0000000280)='./bus\x00', 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd=r3, 0x0, &(0x7f0000000500)=[{&(0x7f0000000100)=""/20, 0x14}], 0x3a}, 0x0) io_uring_enter(r0, 0x2b66, 0x0, 0x0, 0x0, 0x5e) 00:38:08 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@dev, @in6=@dev, 0x0, 0x7, 0x0, 0x0, 0xa, 0x20, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@private2, 0x0, 0x33}, 0x0, @in6=@remote}}, 0xe8) sendmmsg$inet6(r2, &(0x7f0000000180)=[{{&(0x7f0000000040)={0xa, 0x4ea3, 0x0, @remote}, 0x5e, 0x0}}], 0x1, 0x0) 00:38:08 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffe}]}) clone(0x80040300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xfe, &(0x7f00000002c0)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x40) 00:38:08 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) rmdir(&(0x7f0000000700)='./file0\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x2, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x7, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x4001, &(0x7f0000000140)=0x100000000000001, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r1, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffdfff) vmsplice(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f00000003c0)="3c6faadef8a5cb87aab9f09049bd62270a7bd306ff135e3fb39db2bd5fdc906cdf3c3e9f0228eaf4df0083408c07dc917761c08ef9ee40d48d3cf025b85f62c42ac8c3c1cd756c4ce644cf32a3632ace7e421294a2105649c36c64265d371945003e68122d1c2aeaa8e184c25838e721a351fec0301a7ac41daa9f279dd60d54adc7453ce2a452bc62a4adc194aabd3fbd8de353506761acd7923b2e7c359c64b80a2d1124b6f26349af588f032c66d05e76b5817a029220a050ce37b5dcb2d34ff3b38b021ab71d52f8b0eaf6c24a0032b8", 0xd2}], 0x1, 0x5) shmat(r1, &(0x7f0000000000/0x13000)=nil, 0x4000) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000180)=""/120, 0x78}], 0x1, 0x20, 0x2d) open(&(0x7f0000000380)='./file0\x00', 0x880, 0xa0) shmat(r1, &(0x7f0000f4e000/0x3000)=nil, 0x4000) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x34c) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) mbind(&(0x7f0000369000/0x3000)=nil, 0x3000, 0x3, &(0x7f0000000300)=0x80000001, 0x100000000, 0x4) readv(r2, &(0x7f00000012c0)=[{&(0x7f0000001400)=""/4110, 0x100e}], 0x31) 00:38:08 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@dev, @in6=@dev, 0x0, 0x7, 0x0, 0x0, 0xa, 0x20, 0x0, 0x0, 0x0, 0xee01}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@private2, 0x0, 0x33}, 0x0, @in6=@remote}}, 0xe8) sendmmsg$inet6(r2, &(0x7f0000000180)=[{{&(0x7f0000000040)={0xa, 0x4ea3, 0x0, @remote}, 0x5e, 0x0}}], 0x1, 0x0) 00:38:08 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f00000000c0)) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f00000002c0)) [ 353.797932][T19630] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.0'. [ 355.447187][ T25] kauditd_printk_skb: 67626 callbacks suppressed [ 355.447202][ T25] audit: type=1326 audit(1619743089.724:2034253): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 355.478260][ T25] audit: type=1326 audit(1619743089.724:2034254): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 355.502706][ T25] audit: type=1326 audit(1619743089.724:2034255): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 355.527232][ T25] audit: type=1326 audit(1619743089.734:2034256): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 355.552157][ T25] audit: type=1326 audit(1619743089.734:2034257): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 355.576547][ T25] audit: type=1326 audit(1619743089.734:2034258): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 355.600907][ T25] audit: type=1326 audit(1619743089.734:2034259): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 355.625513][ T25] audit: type=1326 audit(1619743089.734:2034260): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 355.650287][ T25] audit: type=1326 audit(1619743089.734:2034261): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 355.674746][ T25] audit: type=1326 audit(1619743089.734:2034262): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 00:38:10 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x7) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) r1 = gettid() tkill(r1, 0x3c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) ptrace$setregs(0xf, r1, 0x3f, &(0x7f0000000140)) 00:38:10 executing program 1: r0 = syz_io_uring_setup(0x75cc, &(0x7f0000000300), &(0x7f0000ffd000/0x1000)=nil, &(0x7f00006d6000/0x2000)=nil, &(0x7f0000000180), &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) write$nbd(r2, &(0x7f00000001c0)=ANY=[], 0x10) dup2(r0, r1) 00:38:10 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffe}]}) clone(0x80040300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xfe, &(0x7f00000002c0)="c4c691019919da078a0098d1e0a593b040f762910000000000000022addee07bee0d6333b5cacd891fa870d434223169b618322ff6602022511253508b5a4496728c2a46e1bc340e29b9ab9b7136283e350808ffdb2dbea7410b36000000007baa17dacdcfac32957dc8bb44e203c4b1bc83d8c0b29f75bcf2e3482945fef116371f8c8c0c4db583a208718e3cccd9dd3bf7a0132044681400bf30024514a6d2675bab926125c43083e773eb3d8dea74700066ee70c42196645292c0e4c3622c102a16be9066fc27e7d4466cbb295eb7f286dcccfde0740cb90366fdd064888fc176574bd977c8c7ef316262a70e75001b11c7c49ae8797518e425ef9080"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x40) 00:38:10 executing program 2: set_mempolicy(0x1, &(0x7f0000000180)=0x100000001, 0x7) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='stack\x00') preadv(r0, &(0x7f0000000340)=[{&(0x7f0000000180)=""/208, 0xd0}], 0x1, 0x0, 0x0) 00:38:10 executing program 3: r0 = syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[]) mknodat(r0, &(0x7f0000000000)='./file0\x00', 0x1000, 0x0) 00:38:10 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="4c0000000104010100000000000000000200000205000100020000000800054000000009060006"], 0x4c}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x447fe5, 0x0) 00:38:10 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x7) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) r1 = gettid() tkill(r1, 0x3c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) ptrace$setregs(0xf, r1, 0x3f, &(0x7f0000000140)) 00:38:10 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x3ec}, 0x10}}, 0x0) 00:38:10 executing program 2: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff}, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 00:38:10 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r3 = socket(0x400000000000010, 0x3, 0x0) write(r3, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(r2, 0x0, 0x22, 0x0, 0x0) 00:38:10 executing program 1: r0 = syz_io_uring_setup(0x75cc, &(0x7f0000000300), &(0x7f0000ffd000/0x1000)=nil, &(0x7f00006d6000/0x2000)=nil, &(0x7f0000000180), &(0x7f0000000000)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) write$nbd(r2, &(0x7f00000001c0)=ANY=[], 0x10) dup2(r0, r1) [ 356.189871][T19668] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.0'. 00:38:10 executing program 3: r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) io_setup(0x202, &(0x7f0000000200)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x25, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000140)='&', 0x1, 0xb000}]) fallocate(r0, 0x100000003, 0x0, 0x80019c) 00:38:10 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) clone(0x40000000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000a80), 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 00:38:10 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) clone(0x40000000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000a80), 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 00:38:10 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) clone(0x40000000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000a80), 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 00:38:10 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) futex(&(0x7f0000000100)=0x1, 0x800000000006, 0x0, &(0x7f0000000040)={0x77359400}, 0x0, 0x0) r1 = gettid() timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, r2, 0x0) tkill(r1, 0x1000000000016) 00:38:10 executing program 3: io_setup(0x7f, &(0x7f0000000000)) 00:38:11 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)=@getpolicy={0x50, 0x15, 0x1, 0x0, 0x0, {{@in=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}}}, 0x50}}, 0x0) 00:38:13 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f00000004c0)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000000)=""/3, 0x3}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x3c) write$sndseq(0xffffffffffffffff, 0x0, 0x0) tkill(r0, 0x2) ptrace$cont(0x18, r0, 0x0, 0x7) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) r1 = gettid() tkill(r1, 0x3c) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r1, 0x0, 0x0) ptrace$setregs(0xf, r1, 0x3f, &(0x7f0000000140)) 00:38:13 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="4c0000000104010100000000000000000200000205000100020000000800054000000009060006"], 0x4c}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) splice(r0, 0x0, r2, 0x0, 0x447fe5, 0x0) 00:38:13 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x2000c0, 0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x100, 0x0) 00:38:13 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x68, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TIMEOUT={0x8}, @CTA_TUPLE_MASTER={0x4}]}, 0x68}}, 0x0) 00:38:13 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000140)=0x2, 0x4) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) sendto$inet(r0, &(0x7f0000000280)='X', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000240)=[@mss, @window, @window, @sack_perm, @window, @window, @window, @sack_perm], 0x8) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000200), 0x88) sendto$inet(r0, &(0x7f00000004c0)="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", 0x20000671, 0x805, 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x13, r2, 0x0) 00:38:13 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) clone(0x40000000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000a80), 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x1, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1]) 00:38:13 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = open$dir(&(0x7f0000000000)='./file0\x00', 0x2040, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r3, &(0x7f0000000100)=ANY=[@ANYBLOB="1c00000007ffff", @ANYRES16=r1], 0x52) r4 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@noextend}]}}) 00:38:13 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r1 = socket(0x400000000000010, 0x802, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$sock_int(r0, 0x1, 0x3e, &(0x7f0000000080)=0xffffffff, 0x4) [ 359.300570][T19754] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.0'. [ 359.308855][ T5520] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=5520 comm=kworker/0:3 [ 359.323718][T19757] 9pnet: p9_errstr2errno: server reported unknown error Á [ 359.336486][ T5520] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=5520 comm=kworker/0:3 00:38:13 executing program 1: mkdir(&(0x7f0000000640)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000180)) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001020, 0x0) 00:38:13 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000010c0), 0x0, 0x22081) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001100), 0x0, 0x0) dup2(r1, r0) 00:38:13 executing program 2: r0 = socket$inet(0x10, 0x80002, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="240000001a0007041dfffd946f610500020000e8fe0208010038080008001d000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 359.349994][T19759] 9pnet: p9_errstr2errno: server reported unknown error Á 00:38:13 executing program 3: r0 = perf_event_open(&(0x7f0000000000)={0x1000000000000001, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xffffffffffffffff, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000140)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fe, &(0x7f00000000c0)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x240, 0x0, 0xfffffffffffffe98) [ 359.424672][T19767] netlink: 'syz-executor.2': attribute type 29 has an invalid length. [ 359.451339][T19767] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 360.456518][ T25] kauditd_printk_skb: 92150 callbacks suppressed [ 360.456529][ T25] audit: type=1326 audit(1619743094.735:2126413): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 360.487586][ T25] audit: type=1326 audit(1619743094.745:2126414): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 360.512175][ T25] audit: type=1326 audit(1619743094.745:2126415): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 360.536510][ T25] audit: type=1326 audit(1619743094.745:2126416): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 360.561033][ T25] audit: type=1326 audit(1619743094.745:2126417): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 360.585797][ T25] audit: type=1326 audit(1619743094.745:2126418): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 360.611772][ T25] audit: type=1326 audit(1619743094.745:2126419): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 360.636936][ T25] audit: type=1326 audit(1619743094.745:2126420): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 360.662498][ T25] audit: type=1326 audit(1619743094.745:2126421): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 360.686954][ T25] audit: type=1326 audit(1619743094.745:2126422): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 00:38:16 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) mknodat(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) renameat(r0, &(0x7f00000001c0)='./file0\x00', r0, &(0x7f0000000200)='./file0\x00') 00:38:16 executing program 1: mkdir(&(0x7f0000000640)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000180)) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001020, 0x0) 00:38:16 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x109842, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800006, 0x11, r0, 0xc00000) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x800002, 0x0) write$binfmt_aout(r2, &(0x7f00000000c0)=ANY=[], 0x23) ftruncate(r1, 0x2008000) ioctl$FIBMAP(r1, 0x1, &(0x7f00000000c0)) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000000640)={0x0, 0x0, "91ab88c5782a5109997a19543eb26782c052f01ad5f7642d4114a9fa250fe9e191603e196976eb9f941501593d90f6650d80d68a378f951ee51b3cb45d61372b7b5afaeae10fa68575c22378ee4bdeb5024ce1ada2c35413caa686311e9080c4d2674ad115a271fbbff0c6bf9c0a9661d6b06a5f8fe00f872cb1a3728dd04afa6bc797373897caab6b28c18ce906ee4abb83d8a1d909c0b7a0c5b40b4d2444a9a6bbdc25f0a6ddb8263ab20d1f6cb177f4182ab8eef8bba16771f2c2bedf6a7a9166aa03debc34b30a17f45b512db5ff75e951dc182ac148b8abc3d78713847429f865c95f4996d30490104e1eb0ba76f6301680dcb927bf6ca73b706979e981", "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"}) madvise(&(0x7f0000000000/0x600000)=nil, 0x60000b, 0x9) 00:38:16 executing program 4: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xc2, &(0x7f0000002600)="c4c691019919da078a0098d1e0a593b040f7629100f06ee04fa4ea57ff22ea97be19af3dcba01419cd2386ad59157689c9c6a47312334c2a97ac2b7f0fb4aabebae8dc5dffbcd48a70502173d6efa56b60f48cf0c9d0989ecbbfc220bd2b39df9ad8d6b14910f4a869863009780dd6e673a02f7ed829932929af9dffb1fa2cd7328202ac55f4f5dbb8494120f79d5f60958691a8a3fcf561c33f46ab89803f47d97e04f7bf9cafb006ae0c480408c8380cf060dd72462ccc5b7d195a113bc539df65"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) r1 = gettid() ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)="04dadda33ac2ad7894e3c9d3984e81f8eabeb637c26b5c5d57fe307c0feea640c806e9bbdf8d44fe8cc14847f386c51dd96a33b3") tkill(r1, 0x34) 00:38:16 executing program 0: request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0) 00:38:16 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f0000000040)=[{0x28, 0x0, 0x0, 0xfffff02c}, {0x6}]}, 0x10) 00:38:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4b, &(0x7f0000000140)=0x3bf, 0x4) setsockopt$inet6_group_source_req(r0, 0x29, 0x6, &(0x7f00000002c0)={0x108, {{0x29, 0x0, 0x2000000, @ipv4={'\x00', '\xff\xff', @broadcast}}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) 00:38:16 executing program 1: mkdir(&(0x7f0000000640)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000180)) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001020, 0x0) 00:38:16 executing program 4: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000140)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) rt_sigqueueinfo(r1, 0x200000000012, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffff9}) ptrace$cont(0x2, r1, 0x0, 0x0) 00:38:16 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x8, 0x7fffffff}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x0, 0x0) shutdown(r0, 0x0) 00:38:16 executing program 5: creat(&(0x7f0000000280)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f00000000c0)={[{@mpol={'mpol', 0x3d, {'prefer', '', @val={0x3a, [0x30, 0x2d, 0x35, 0x3a, 0x0]}}}, 0x33}]}) 00:38:16 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt(r0, 0x0, 0x40, &(0x7f0000000040)="deab00938cc715ad49e23b2c02b8edf00b880d2e87fcb5048075445bee5a7d1eacc48d9ad3e5e677cc34f224b17b1a4e93f8437a876e9e2d156d176357803a58bbc75cec5c28f4107ca58f97b33c34187dc682093f50fe8e", 0x58) 00:38:16 executing program 1: mkdir(&(0x7f0000000640)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000180)) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x2001020, 0x0) 00:38:16 executing program 4: getrandom(&(0x7f0000000100)=""/113, 0x9c8a80933bffaea5, 0x0) [ 362.425140][T19819] tmpfs: Bad value for 'mpol' 00:38:17 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000140)=0xa80, 0x4) sendmmsg$inet6(r0, &(0x7f0000006b80)=[{{&(0x7f0000000040)={0xa, 0x4e24, 0x0, @local}, 0x1c, 0x0}}, {{&(0x7f0000000340)={0xa, 0x4e24, 0x0, @remote}, 0x1c, 0x0, 0x0, &(0x7f0000003700)=[@dstopts_2292={{0x2e8, 0x29, 0x4, {0x0, 0x5a, '\x00', [@jumbo, @generic={0x0, 0xdf, "aac7f65dde66007550d861b7b537fd49b44ed35b0b7c2ed243f39735881ba7309715165c3b9edec92e7dadb7a5bbdd45a5fd4320d89ed45cf375461e38967ad0f0891dc4bbba54a2c4b99498353dcc9f0233d55a6e0fbf78c3ba4e983f48b6f65060c96fd75c4a82e937f62c958445a04c99c7646db75133bf141405b7db695b0de9a482a9dc8dc3a25f15db0153211c3604213a2baf4222bf165fdfa2ca3fddc94be49ac220c6fec65b5f419d364efc16072c068df6df4ff736f92d14e2d5c87eb699c31f1755ba93bf935b06fb93bdb863bb796b4fa365b5b80e7eacb78b"}, @enc_lim, @calipso={0x7, 0x18, {0x0, 0x4, 0x0, 0x0, [0x0, 0x0]}}, @calipso={0x7, 0x30, {0x0, 0xa, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, @generic={0x0, 0x198, "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"}]}}}], 0x2e8}}], 0x2, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x12020, 0x0, 0x0) 00:38:17 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$GIO_UNIMAP(r0, 0x4b32, 0x0) 00:38:17 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r1, &(0x7f0000000180), 0x12) write$cgroup_int(r0, &(0x7f0000000200), 0xfdef) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000080)={0x0, 0x2, 0x0, 0xffff}) ioctl$FITRIM(r1, 0x40305839, &(0x7f0000000000)={0x0, 0x8001, 0xaaf9}) 00:38:17 executing program 1: r0 = eventfd(0x0) read$eventfd(r0, &(0x7f0000000000), 0x8) 00:38:17 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x8, 0x7fffffff}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x0, 0x0) shutdown(r0, 0x0) 00:38:17 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffe}]}) clone(0x80040300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xd1, &(0x7f00000002c0)="c4c691019919da078a0098d1e0a593b040f762910000000000000022addee07bee0d6333b5cacd891fa870d434223169b618322ff6602022511253508b5a4496728c2a46e1bc340e29b9ab9b7136283e350808ffdb2dbea7410b36000000007baa17dacdcfac32957dc8bb44e203c4b1bc83d8c0b29f75bcf2e3482945fef116371f8c8c0c4db583a208718e3cccd9dd3bf7a0132044681400bf30024514a6d2675bab926125c43083e773eb3d8dea74700066ee70c42196645292c0e4c3622c102a16be9066fc27e7d4466cbb295eb7f2"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x40) 00:38:17 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x6b, &(0x7f0000000440)="c4c691019919da078a0098d1e0a593b040f7629100f06ee04fa4ea57ff22ea97be19af3dcba01419cd2386ad59157689c9c6a47312334c2a97ac2b7f0fb4aabebae8dc5dffbcd48a70502173d6efa56b60f48cf0c9d0989ecbbfc220bd2b39df9ad8d6b14910f4a8698630"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x34) 00:38:17 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) lseek(r0, 0x0, 0x1) 00:38:17 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = syz_io_uring_setup(0x85, &(0x7f0000000100), &(0x7f0000ffc000/0x2000)=nil, &(0x7f00006d6000/0x1000)=nil, &(0x7f0000000180), &(0x7f0000000000)) io_uring_enter(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:38:17 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x8, 0x7fffffff}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x0, 0x0) shutdown(r0, 0x0) 00:38:17 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffe}]}) clone(0x80040300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xd1, &(0x7f00000002c0)="c4c691019919da078a0098d1e0a593b040f762910000000000000022addee07bee0d6333b5cacd891fa870d434223169b618322ff6602022511253508b5a4496728c2a46e1bc340e29b9ab9b7136283e350808ffdb2dbea7410b36000000007baa17dacdcfac32957dc8bb44e203c4b1bc83d8c0b29f75bcf2e3482945fef116371f8c8c0c4db583a208718e3cccd9dd3bf7a0132044681400bf30024514a6d2675bab926125c43083e773eb3d8dea74700066ee70c42196645292c0e4c3622c102a16be9066fc27e7d4466cbb295eb7f2"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x40) 00:38:17 executing program 4: getrandom(&(0x7f0000000100)=""/113, 0x9c8a80933bffaea5, 0x0) 00:38:17 executing program 3: mknod$loop(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000040)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 00:38:17 executing program 0: clone3(&(0x7f0000006f80)={0x14109100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:38:17 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffe}]}) clone(0x80040300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xd1, &(0x7f00000002c0)="c4c691019919da078a0098d1e0a593b040f762910000000000000022addee07bee0d6333b5cacd891fa870d434223169b618322ff6602022511253508b5a4496728c2a46e1bc340e29b9ab9b7136283e350808ffdb2dbea7410b36000000007baa17dacdcfac32957dc8bb44e203c4b1bc83d8c0b29f75bcf2e3482945fef116371f8c8c0c4db583a208718e3cccd9dd3bf7a0132044681400bf30024514a6d2675bab926125c43083e773eb3d8dea74700066ee70c42196645292c0e4c3622c102a16be9066fc27e7d4466cbb295eb7f2"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x40) 00:38:17 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @local, @multicast1}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @local, 0x1}, 0x10) 00:38:17 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_io_uring_setup(0x87, &(0x7f00000002c0), &(0x7f0000ff9000/0x4000)=nil, &(0x7f00006d7000/0x1000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000240)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000040)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x100}, 0x0) io_uring_enter(r1, 0x450c, 0x0, 0x0, 0x0, 0x0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x24, 0x0, 0xc15, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) 00:38:17 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240), r0) sendmsg$NLBL_UNLABEL_C_STATICADD(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)={0x3c, r2, 0x1, 0x0, 0x0, {0x4}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'bond0\x00'}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}]}, 0x3c}}, 0x0) 00:38:17 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7ffffffe}]}) clone(0x80040300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xd1, &(0x7f00000002c0)="c4c691019919da078a0098d1e0a593b040f762910000000000000022addee07bee0d6333b5cacd891fa870d434223169b618322ff6602022511253508b5a4496728c2a46e1bc340e29b9ab9b7136283e350808ffdb2dbea7410b36000000007baa17dacdcfac32957dc8bb44e203c4b1bc83d8c0b29f75bcf2e3482945fef116371f8c8c0c4db583a208718e3cccd9dd3bf7a0132044681400bf30024514a6d2675bab926125c43083e773eb3d8dea74700066ee70c42196645292c0e4c3622c102a16be9066fc27e7d4466cbb295eb7f2"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x40) 00:38:17 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x8, 0x7fffffff}, 0x0) sched_setattr(0x0, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x0, 0x0) shutdown(r0, 0x0) 00:38:18 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @local, @multicast1}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @local, 0x1}, 0x10) 00:38:18 executing program 0: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000280)={0x4000}, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)={0x20, 0x16, 0xa01, 0x0, 0x0, {}, [@nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0x4, 0x0, 0x0, @u32}]}]}, 0x20}}, 0x0) 00:38:18 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r1, &(0x7f0000000180), 0x12) write$cgroup_int(r0, &(0x7f0000000200), 0xfdef) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000080)={0x0, 0x2, 0x0, 0xffff}) ioctl$FITRIM(r1, 0x40305839, &(0x7f0000000000)={0x0, 0x8001, 0x1fe}) 00:38:18 executing program 4: getrandom(&(0x7f0000000100)=""/113, 0x9c8a80933bffaea5, 0x0) 00:38:18 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r0, &(0x7f0000005000)=[{{&(0x7f0000000040)={0xa, 0x0, 0x0, @loopback={0xff00000000000000}}, 0x1c, 0x0}}], 0x1, 0x200440c1) 00:38:18 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @local, @multicast1}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @local, 0x1}, 0x10) 00:38:18 executing program 3: syz_mount_image$msdos(0x0, &(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x401c5820, &(0x7f00000001c0)=0x200c626) r1 = open$dir(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000080)) 00:38:18 executing program 0: r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) io_setup(0x202, &(0x7f0000000200)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x1a000000}]) io_submit(r2, 0x1, &(0x7f0000000100)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x2}]) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) dup3(r3, r0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 00:38:18 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e1000000887700720030070082ffffff00000000008000da55aa", 0x40, 0x1c0}]) 00:38:18 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x30, r1, 0xee72737c57058e63, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6}]}, 0x30}}, 0x0) 00:38:18 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @local, @multicast1}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast2, @local, 0x1}, 0x10) [ 364.399958][T19950] loop2: detected capacity change from 0 to 1 [ 364.461954][T19950] loop2: p1 p2 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p2 [ 364.462097][T19950] loop2: p1 start 10 is beyond EOD, truncated [ 364.555857][T19950] loop2: p2 size 2 extends beyond EOD, truncated 00:38:18 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0x5) setuid(r3) shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) 00:38:18 executing program 1: set_mempolicy(0x3, &(0x7f00000001c0)=0x9, 0x6) r0 = io_uring_setup(0x2ea9, &(0x7f0000000140)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f00000002c0)=[0xffffffffffffffff], 0x2500) io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[0xffffffffffffffff, 0xffffffffffffffff]}, 0x2) 00:38:18 executing program 5: r0 = socket(0x2, 0xa, 0x0) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000002b80)={0x0, @in={0x2, 0x0, @loopback}, @can, @nl=@unspec, 0x1ff}) 00:38:18 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0x5) setuid(r3) shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) [ 364.803888][T19950] loop2: p3 start 225 is beyond EOD, truncated [ 364.810147][T19950] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 364.820031][T19950] loop2: p5 start 10 is beyond EOD, truncated [ 364.826151][T19950] loop2: p6 start 10 is beyond EOD, truncated [ 364.832224][T19950] loop2: p7 start 10 is beyond EOD, truncated [ 364.838343][T19950] loop2: p8 start 10 is beyond EOD, truncated [ 364.844425][T19950] loop2: p9 start 10 is beyond EOD, truncated [ 364.850503][T19950] loop2: p10 start 10 is beyond EOD, truncated [ 364.856748][T19950] loop2: p11 start 10 is beyond EOD, truncated [ 364.862956][T19950] loop2: p12 start 10 is beyond EOD, truncated [ 364.869251][T19950] loop2: p13 start 10 is beyond EOD, truncated [ 364.875626][T19950] loop2: p14 start 10 is beyond EOD, truncated [ 364.881944][T19950] loop2: p15 start 10 is beyond EOD, truncated [ 364.888415][T19950] loop2: p16 start 10 is beyond EOD, truncated [ 364.894666][T19950] loop2: p17 start 10 is beyond EOD, truncated [ 364.900929][T19950] loop2: p18 start 10 is beyond EOD, truncated [ 364.907285][T19950] loop2: p19 start 10 is beyond EOD, truncated [ 364.913766][T19950] loop2: p20 start 10 is beyond EOD, truncated [ 364.920868][T19950] loop2: p21 start 10 is beyond EOD, truncated [ 364.927068][T19950] loop2: p22 start 10 is beyond EOD, truncated [ 364.933381][T19950] loop2: p23 start 10 is beyond EOD, truncated [ 364.939560][T19950] loop2: p24 start 10 is beyond EOD, truncated [ 364.945740][T19950] loop2: p25 start 10 is beyond EOD, truncated [ 364.952356][T19950] loop2: p26 start 10 is beyond EOD, truncated [ 364.958550][T19950] loop2: p27 start 10 is beyond EOD, truncated [ 364.964859][T19950] loop2: p28 start 10 is beyond EOD, truncated [ 364.971043][T19950] loop2: p29 start 10 is beyond EOD, truncated [ 364.977207][T19950] loop2: p30 start 10 is beyond EOD, truncated [ 364.983384][T19950] loop2: p31 start 10 is beyond EOD, truncated [ 364.989551][T19950] loop2: p32 start 10 is beyond EOD, truncated [ 364.995693][T19950] loop2: p33 start 10 is beyond EOD, truncated [ 365.001882][T19950] loop2: p34 start 10 is beyond EOD, truncated [ 365.008035][T19950] loop2: p35 start 10 is beyond EOD, truncated [ 365.014185][T19950] loop2: p36 start 10 is beyond EOD, truncated [ 365.020349][T19950] loop2: p37 start 10 is beyond EOD, truncated [ 365.026504][T19950] loop2: p38 start 10 is beyond EOD, truncated [ 365.032663][T19950] loop2: p39 start 10 is beyond EOD, truncated [ 365.038818][T19950] loop2: p40 start 10 is beyond EOD, truncated [ 365.046018][T19950] loop2: p41 start 10 is beyond EOD, truncated [ 365.052288][T19950] loop2: p42 start 10 is beyond EOD, truncated [ 365.058591][T19950] loop2: p43 start 10 is beyond EOD, truncated [ 365.064737][T19950] loop2: p44 start 10 is beyond EOD, truncated [ 365.070913][T19950] loop2: p45 start 10 is beyond EOD, truncated [ 365.077115][T19950] loop2: p46 start 10 is beyond EOD, truncated [ 365.083317][T19950] loop2: p47 start 10 is beyond EOD, truncated [ 365.089499][T19950] loop2: p48 start 10 is beyond EOD, truncated [ 365.095644][T19950] loop2: p49 start 10 is beyond EOD, truncated [ 365.101865][T19950] loop2: p50 start 10 is beyond EOD, truncated [ 365.108036][T19950] loop2: p51 start 10 is beyond EOD, truncated [ 365.114206][T19950] loop2: p52 start 10 is beyond EOD, truncated [ 365.120459][T19950] loop2: p53 start 10 is beyond EOD, truncated [ 365.126625][T19950] loop2: p54 start 10 is beyond EOD, truncated [ 365.132776][T19950] loop2: p55 start 10 is beyond EOD, truncated [ 365.139027][T19950] loop2: p56 start 10 is beyond EOD, truncated [ 365.145170][T19950] loop2: p57 start 10 is beyond EOD, truncated [ 365.151702][T19950] loop2: p58 start 10 is beyond EOD, truncated [ 365.157865][T19950] loop2: p59 start 10 is beyond EOD, truncated [ 365.164112][T19950] loop2: p60 start 10 is beyond EOD, truncated [ 365.170294][T19950] loop2: p61 start 10 is beyond EOD, truncated [ 365.176492][T19950] loop2: p62 start 10 is beyond EOD, truncated [ 365.182640][T19950] loop2: p63 start 10 is beyond EOD, truncated [ 365.188803][T19950] loop2: p64 start 10 is beyond EOD, truncated [ 365.194967][T19950] loop2: p65 start 10 is beyond EOD, truncated [ 365.201301][T19950] loop2: p66 start 10 is beyond EOD, truncated [ 365.207478][T19950] loop2: p67 start 10 is beyond EOD, truncated [ 365.213733][T19950] loop2: p68 start 10 is beyond EOD, truncated [ 365.219935][T19950] loop2: p69 start 10 is beyond EOD, truncated [ 365.226115][T19950] loop2: p70 start 10 is beyond EOD, truncated [ 365.232274][T19950] loop2: p71 start 10 is beyond EOD, truncated [ 365.238639][T19950] loop2: p72 start 10 is beyond EOD, truncated [ 365.244814][T19950] loop2: p73 start 10 is beyond EOD, truncated [ 365.251146][T19950] loop2: p74 start 10 is beyond EOD, truncated [ 365.257418][T19950] loop2: p75 start 10 is beyond EOD, truncated [ 365.263645][T19950] loop2: p76 start 10 is beyond EOD, truncated [ 365.269832][T19950] loop2: p77 start 10 is beyond EOD, truncated [ 365.276523][T19950] loop2: p78 start 10 is beyond EOD, truncated [ 365.286167][T19950] loop2: p79 start 10 is beyond EOD, truncated [ 365.292352][T19950] loop2: p80 start 10 is beyond EOD, truncated [ 365.298535][T19950] loop2: p81 start 10 is beyond EOD, truncated 00:38:19 executing program 4: getrandom(&(0x7f0000000100)=""/113, 0x9c8a80933bffaea5, 0x0) 00:38:19 executing program 5: r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)=0x20000008) r1 = open(&(0x7f0000000100)='.\x00', 0x0, 0x0) r2 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) renameat2(r1, &(0x7f0000000140)='./file0\x00', r2, &(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x2) 00:38:19 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0x5) setuid(r3) shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) 00:38:19 executing program 1: r0 = add_key(&(0x7f0000000100)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)=')', 0x1, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffe, r0, 0x0) [ 365.304679][T19950] loop2: p82 start 10 is beyond EOD, truncated [ 365.310908][T19950] loop2: p83 start 10 is beyond EOD, truncated [ 365.317091][T19950] loop2: p84 start 10 is beyond EOD, truncated [ 365.323244][T19950] loop2: p85 start 10 is beyond EOD, truncated [ 365.329548][T19950] loop2: p86 start 10 is beyond EOD, truncated [ 365.335694][T19950] loop2: p87 start 10 is beyond EOD, truncated [ 365.341858][T19950] loop2: p88 start 10 is beyond EOD, truncated [ 365.348076][T19950] loop2: p89 start 10 is beyond EOD, truncated [ 365.354222][T19950] loop2: p90 start 10 is beyond EOD, truncated [ 365.360415][T19950] loop2: p91 start 10 is beyond EOD, truncated [ 365.366582][T19950] loop2: p92 start 10 is beyond EOD, truncated [ 365.372734][T19950] loop2: p93 start 10 is beyond EOD, truncated [ 365.378935][T19950] loop2: p94 start 10 is beyond EOD, truncated [ 365.385149][T19950] loop2: p95 start 10 is beyond EOD, truncated [ 365.391379][T19950] loop2: p96 start 10 is beyond EOD, truncated [ 365.397670][T19950] loop2: p97 start 10 is beyond EOD, truncated [ 365.403839][T19950] loop2: p98 start 10 is beyond EOD, truncated [ 365.410150][T19950] loop2: p99 start 10 is beyond EOD, truncated [ 365.416319][T19950] loop2: p100 start 10 is beyond EOD, truncated [ 365.422825][T19950] loop2: p101 start 10 is beyond EOD, truncated [ 365.429117][T19950] loop2: p102 start 10 is beyond EOD, truncated [ 365.435348][T19950] loop2: p103 start 10 is beyond EOD, truncated [ 365.441641][T19950] loop2: p104 start 10 is beyond EOD, truncated [ 365.447893][T19950] loop2: p105 start 10 is beyond EOD, truncated [ 365.454126][T19950] loop2: p106 start 10 is beyond EOD, truncated [ 365.461800][T19950] loop2: p107 start 10 is beyond EOD, truncated [ 365.466944][ T25] kauditd_printk_skb: 56160 callbacks suppressed [ 365.466954][ T25] audit: type=1326 audit(1619743099.596:2182583): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 365.468129][T19950] loop2: p108 start 10 is beyond EOD, [ 365.478848][ T25] audit: type=1326 audit(1619743099.756:2182584): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 365.498769][T19950] truncated [ 365.498778][T19950] loop2: p109 start 10 is beyond EOD, truncated [ 365.498794][T19950] loop2: p110 start 10 is beyond EOD, [ 365.528575][ T25] audit: type=1326 audit(1619743099.756:2182585): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 365.531671][T19950] truncated [ 365.531676][T19950] loop2: p111 start 10 is beyond EOD, truncated [ 365.531690][T19950] loop2: p112 start 10 is beyond EOD, [ 365.548981][ T25] audit: type=1326 audit(1619743099.756:2182586): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 365.568421][T19950] truncated [ 365.568428][T19950] loop2: p113 start 10 is beyond EOD, truncated [ 365.568494][T19950] loop2: p114 start 10 is beyond EOD, truncated [ 365.568503][T19950] loop2: p115 start 10 is beyond EOD, truncated [ 365.568512][T19950] loop2: p116 start 10 is beyond EOD, [ 365.595427][ T25] audit: type=1326 audit(1619743099.756:2182587): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 365.607640][T19950] truncated [ 365.607646][T19950] loop2: p117 start 10 is beyond EOD, truncated [ 365.607661][T19950] loop2: p118 start 10 is beyond EOD, [ 365.625957][ T25] audit: type=1326 audit(1619743099.756:2182588): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 365.629502][T19950] truncated [ 365.629507][T19950] loop2: p119 start 10 is beyond EOD, truncated [ 365.629518][T19950] loop2: p120 start 10 is beyond EOD, truncated [ 365.629527][T19950] loop2: p121 start 10 is beyond EOD, truncated [ 365.629536][T19950] loop2: p122 start 10 is beyond EOD, truncated [ 365.641041][ T25] audit: type=1326 audit(1619743099.766:2182589): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 365.659310][T19950] loop2: p123 start 10 is beyond EOD, truncated [ 365.659330][T19950] loop2: p124 start 10 is beyond EOD, truncated [ 365.659340][T19950] loop2: p125 start 10 is beyond EOD, truncated [ 365.659349][T19950] loop2: p126 start 10 is beyond EOD, truncated [ 365.659358][T19950] loop2: p127 start 10 is beyond EOD, truncated [ 365.683949][ T25] audit: type=1326 audit(1619743099.766:2182590): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 365.698559][T19950] loop2: p128 start 10 is beyond EOD, truncated [ 365.698579][T19950] loop2: p129 start 10 is beyond EOD, truncated [ 365.698589][T19950] loop2: p130 start 10 is beyond EOD, [ 365.720097][ T25] audit: type=1326 audit(1619743099.766:2182591): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 365.724552][T19950] truncated [ 365.724563][T19950] loop2: p131 start 10 is beyond EOD, truncated [ 365.724583][T19950] loop2: p132 start 10 is beyond EOD, [ 365.745253][ T25] audit: type=1326 audit(1619743099.766:2182592): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 365.758013][T19950] truncated [ 365.898990][T19950] loop2: p133 start 10 is beyond EOD, truncated [ 365.905433][T19950] loop2: p134 start 10 is beyond EOD, truncated [ 365.911706][T19950] loop2: p135 start 10 is beyond EOD, truncated [ 365.917970][T19950] loop2: p136 start 10 is beyond EOD, truncated [ 365.924203][T19950] loop2: p137 start 10 is beyond EOD, truncated [ 365.930508][T19950] loop2: p138 start 10 is beyond EOD, truncated [ 365.936776][T19950] loop2: p139 start 10 is beyond EOD, truncated [ 365.943020][T19950] loop2: p140 start 10 is beyond EOD, truncated [ 365.949337][T19950] loop2: p141 start 10 is beyond EOD, truncated [ 365.955650][T19950] loop2: p142 start 10 is beyond EOD, truncated [ 365.961938][T19950] loop2: p143 start 10 is beyond EOD, truncated [ 365.968195][T19950] loop2: p144 start 10 is beyond EOD, truncated [ 365.974435][T19950] loop2: p145 start 10 is beyond EOD, truncated [ 365.980713][T19950] loop2: p146 start 10 is beyond EOD, truncated [ 365.987076][T19950] loop2: p147 start 10 is beyond EOD, truncated [ 365.993319][T19950] loop2: p148 start 10 is beyond EOD, truncated [ 365.999610][T19950] loop2: p149 start 10 is beyond EOD, truncated [ 366.005877][T19950] loop2: p150 start 10 is beyond EOD, truncated [ 366.012114][T19950] loop2: p151 start 10 is beyond EOD, truncated [ 366.018363][T19950] loop2: p152 start 10 is beyond EOD, truncated [ 366.024596][T19950] loop2: p153 start 10 is beyond EOD, truncated [ 366.030840][T19950] loop2: p154 start 10 is beyond EOD, truncated [ 366.037447][T19950] loop2: p155 start 10 is beyond EOD, truncated [ 366.043762][T19950] loop2: p156 start 10 is beyond EOD, truncated [ 366.050164][T19950] loop2: p157 start 10 is beyond EOD, truncated [ 366.056416][T19950] loop2: p158 start 10 is beyond EOD, truncated [ 366.062654][T19950] loop2: p159 start 10 is beyond EOD, truncated [ 366.069043][T19950] loop2: p160 start 10 is beyond EOD, truncated [ 366.075455][T19950] loop2: p161 start 10 is beyond EOD, truncated [ 366.081721][T19950] loop2: p162 start 10 is beyond EOD, truncated [ 366.088095][T19950] loop2: p163 start 10 is beyond EOD, truncated [ 366.094330][T19950] loop2: p164 start 10 is beyond EOD, truncated [ 366.100607][T19950] loop2: p165 start 10 is beyond EOD, truncated [ 366.106862][T19950] loop2: p166 start 10 is beyond EOD, truncated [ 366.113093][T19950] loop2: p167 start 10 is beyond EOD, truncated [ 366.119348][T19950] loop2: p168 start 10 is beyond EOD, truncated [ 366.125583][T19950] loop2: p169 start 10 is beyond EOD, truncated [ 366.131897][T19950] loop2: p170 start 10 is beyond EOD, truncated [ 366.138152][T19950] loop2: p171 start 10 is beyond EOD, truncated [ 366.144477][T19950] loop2: p172 start 10 is beyond EOD, truncated [ 366.150744][T19950] loop2: p173 start 10 is beyond EOD, truncated [ 366.157112][T19950] loop2: p174 start 10 is beyond EOD, truncated [ 366.163438][T19950] loop2: p175 start 10 is beyond EOD, truncated [ 366.169709][T19950] loop2: p176 start 10 is beyond EOD, truncated [ 366.176022][T19950] loop2: p177 start 10 is beyond EOD, truncated [ 366.182253][T19950] loop2: p178 start 10 is beyond EOD, truncated [ 366.188530][T19950] loop2: p179 start 10 is beyond EOD, truncated [ 366.194754][T19950] loop2: p180 start 10 is beyond EOD, truncated [ 366.201023][T19950] loop2: p181 start 10 is beyond EOD, truncated [ 366.207305][T19950] loop2: p182 start 10 is beyond EOD, truncated [ 366.213532][T19950] loop2: p183 start 10 is beyond EOD, truncated [ 366.219796][T19950] loop2: p184 start 10 is beyond EOD, truncated [ 366.226040][T19950] loop2: p185 start 10 is beyond EOD, truncated [ 366.232310][T19950] loop2: p186 start 10 is beyond EOD, truncated [ 366.238900][T19950] loop2: p187 start 10 is beyond EOD, truncated [ 366.245136][T19950] loop2: p188 start 10 is beyond EOD, truncated [ 366.251392][T19950] loop2: p189 start 10 is beyond EOD, truncated [ 366.257769][T19950] loop2: p190 start 10 is beyond EOD, truncated [ 366.264005][T19950] loop2: p191 start 10 is beyond EOD, truncated [ 366.270256][T19950] loop2: p192 start 10 is beyond EOD, truncated [ 366.276556][T19950] loop2: p193 start 10 is beyond EOD, truncated [ 366.282792][T19950] loop2: p194 start 10 is beyond EOD, truncated [ 366.289120][T19950] loop2: p195 start 10 is beyond EOD, truncated [ 366.295389][T19950] loop2: p196 start 10 is beyond EOD, truncated [ 366.301651][T19950] loop2: p197 start 10 is beyond EOD, truncated [ 366.307908][T19950] loop2: p198 start 10 is beyond EOD, truncated [ 366.314173][T19950] loop2: p199 start 10 is beyond EOD, truncated [ 366.320415][T19950] loop2: p200 start 10 is beyond EOD, truncated [ 366.326666][T19950] loop2: p201 start 10 is beyond EOD, truncated [ 366.333002][T19950] loop2: p202 start 10 is beyond EOD, truncated [ 366.339265][T19950] loop2: p203 start 10 is beyond EOD, truncated [ 366.345495][T19950] loop2: p204 start 10 is beyond EOD, truncated [ 366.351755][T19950] loop2: p205 start 10 is beyond EOD, truncated [ 366.358006][T19950] loop2: p206 start 10 is beyond EOD, truncated [ 366.364548][T19950] loop2: p207 start 10 is beyond EOD, truncated [ 366.370919][T19950] loop2: p208 start 10 is beyond EOD, truncated [ 366.377185][T19950] loop2: p209 start 10 is beyond EOD, truncated [ 366.383415][T19950] loop2: p210 start 10 is beyond EOD, truncated [ 366.390067][T19950] loop2: p211 start 10 is beyond EOD, truncated [ 366.396334][T19950] loop2: p212 start 10 is beyond EOD, truncated [ 366.402618][T19950] loop2: p213 start 10 is beyond EOD, truncated [ 366.408926][T19950] loop2: p214 start 10 is beyond EOD, truncated [ 366.415159][T19950] loop2: p215 start 10 is beyond EOD, truncated [ 366.421425][T19950] loop2: p216 start 10 is beyond EOD, truncated [ 366.427684][T19950] loop2: p217 start 10 is beyond EOD, truncated [ 366.433937][T19950] loop2: p218 start 10 is beyond EOD, truncated [ 366.440340][T19950] loop2: p219 start 10 is beyond EOD, truncated [ 366.446582][T19950] loop2: p220 start 10 is beyond EOD, truncated [ 366.452826][T19950] loop2: p221 start 10 is beyond EOD, truncated [ 366.459111][T19950] loop2: p222 start 10 is beyond EOD, truncated [ 366.465384][T19950] loop2: p223 start 10 is beyond EOD, truncated [ 366.471728][T19950] loop2: p224 start 10 is beyond EOD, truncated [ 366.478059][T19950] loop2: p225 start 10 is beyond EOD, truncated [ 366.484297][T19950] loop2: p226 start 10 is beyond EOD, truncated [ 366.490557][T19950] loop2: p227 start 10 is beyond EOD, truncated [ 366.496820][T19950] loop2: p228 start 10 is beyond EOD, truncated [ 366.503140][T19950] loop2: p229 start 10 is beyond EOD, truncated [ 366.509624][T19950] loop2: p230 start 10 is beyond EOD, truncated [ 366.515873][T19950] loop2: p231 start 10 is beyond EOD, truncated [ 366.522108][T19950] loop2: p232 start 10 is beyond EOD, truncated [ 366.528789][T19950] loop2: p233 start 10 is beyond EOD, truncated [ 366.535018][T19950] loop2: p234 start 10 is beyond EOD, truncated [ 366.541328][T19950] loop2: p235 start 10 is beyond EOD, truncated [ 366.547592][T19950] loop2: p236 start 10 is beyond EOD, truncated [ 366.553831][T19950] loop2: p237 start 10 is beyond EOD, truncated [ 366.560172][T19950] loop2: p238 start 10 is beyond EOD, truncated [ 366.566453][T19950] loop2: p239 start 10 is beyond EOD, truncated [ 366.573143][T19950] loop2: p240 start 10 is beyond EOD, truncated [ 366.579407][T19950] loop2: p241 start 10 is beyond EOD, truncated [ 366.585642][T19950] loop2: p242 start 10 is beyond EOD, truncated [ 366.592010][T19950] loop2: p243 start 10 is beyond EOD, truncated [ 366.598374][T19950] loop2: p244 start 10 is beyond EOD, truncated [ 366.604610][T19950] loop2: p245 start 10 is beyond EOD, truncated [ 366.610871][T19950] loop2: p246 start 10 is beyond EOD, truncated [ 366.617546][T19950] loop2: p247 start 10 is beyond EOD, truncated [ 366.623995][T19950] loop2: p248 start 10 is beyond EOD, truncated [ 366.631049][T19950] loop2: p249 start 10 is beyond EOD, truncated [ 366.637411][T19950] loop2: p250 start 10 is beyond EOD, truncated [ 366.643720][T19950] loop2: p251 start 10 is beyond EOD, truncated [ 366.649978][T19950] loop2: p252 start 10 is beyond EOD, truncated [ 366.656263][T19950] loop2: p253 start 10 is beyond EOD, truncated [ 366.662490][T19950] loop2: p254 start 10 is beyond EOD, truncated [ 366.668740][T19950] loop2: p255 start 10 is beyond EOD, truncated 00:38:21 executing program 4: r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ffd000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000140)=@IORING_OP_WRITE={0x17, 0x0, 0x4008, @fd_index, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) 00:38:21 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e1000000887700720030070082ffffff00000000008000da55aa", 0x40, 0x1c0}]) 00:38:21 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="82bb7102cc6509f63760ce09f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdc09db24a04062f28e5dbbde8856729a952b0100", 0x38}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:38:21 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0x5) setuid(r3) shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) 00:38:21 executing program 0: r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) io_setup(0x202, &(0x7f0000000200)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x1a000000}]) io_submit(r2, 0x1, &(0x7f0000000100)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x2}]) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) dup3(r3, r0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 00:38:21 executing program 5: select(0x20000088, 0x0, 0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1000000000000}, &(0x7f00000000c0)={0x0, 0x2710}) 00:38:21 executing program 4: r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ffd000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000140)=@IORING_OP_WRITE={0x17, 0x0, 0x4008, @fd_index, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) 00:38:21 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shutdown(0xffffffffffffffff, 0x1) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:38:21 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = dup(r0) ioctl$KDSIGACCEPT(r1, 0x5608, 0x37) [ 366.825355][ T1029] loop2: p1 p2 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p2 [ 366.825548][ T1029] loop2: p1 start 10 is beyond EOD, truncated [ 366.919391][ T1029] loop2: p2 size 2 extends beyond EOD, truncated 00:38:21 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = dup(r0) ioctl$KDSIGACCEPT(r1, 0x5608, 0x37) 00:38:21 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x8a, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000280)={0x38, 0x2, 0x0, 0x0, 0x8}, 0x0) timer_create(0x0, &(0x7f0000000440)={0x0, 0x12}, &(0x7f0000000040)) r1 = syz_open_dev$usbmon(&(0x7f0000000380), 0x0, 0x0) preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000180)=""/191, 0xbf}], 0x1, 0x0, 0x0) ioctl$MON_IOCX_MFETCH(r1, 0x80089203, 0x0) r2 = getpid() timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) tkill(r2, 0x800000015) 00:38:21 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = dup(r0) ioctl$KDSIGACCEPT(r1, 0x5608, 0x37) 00:38:21 executing program 4: r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ffd000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000140)=@IORING_OP_WRITE={0x17, 0x0, 0x4008, @fd_index, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) [ 367.083066][ T1029] loop2: p3 start 225 is beyond EOD, truncated [ 367.089412][ T1029] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 367.102257][ T1029] loop2: p5 start 10 is beyond EOD, truncated [ 367.111155][ T1029] loop2: p6 start 10 is beyond EOD, truncated [ 367.117274][ T1029] loop2: p7 start 10 is beyond EOD, truncated [ 367.123386][ T1029] loop2: p8 start 10 is beyond EOD, truncated [ 367.129462][ T1029] loop2: p9 start 10 is beyond EOD, truncated [ 367.135521][ T1029] loop2: p10 start 10 is beyond EOD, truncated [ 367.141701][ T1029] loop2: p11 start 10 is beyond EOD, truncated [ 367.147863][ T1029] loop2: p12 start 10 is beyond EOD, truncated [ 367.154136][ T1029] loop2: p13 start 10 is beyond EOD, truncated [ 367.160404][ T1029] loop2: p14 start 10 is beyond EOD, truncated [ 367.166596][ T1029] loop2: p15 start 10 is beyond EOD, truncated [ 367.172743][ T1029] loop2: p16 start 10 is beyond EOD, truncated [ 367.178936][ T1029] loop2: p17 start 10 is beyond EOD, truncated [ 367.185129][ T1029] loop2: p18 start 10 is beyond EOD, truncated [ 367.191293][ T1029] loop2: p19 start 10 is beyond EOD, truncated [ 367.202348][ T1029] loop2: p20 start 10 is beyond EOD, truncated [ 367.208538][ T1029] loop2: p21 start 10 is beyond EOD, truncated [ 367.214681][ T1029] loop2: p22 start 10 is beyond EOD, truncated [ 367.220854][ T1029] loop2: p23 start 10 is beyond EOD, truncated [ 367.227196][ T1029] loop2: p24 start 10 is beyond EOD, truncated [ 367.233343][ T1029] loop2: p25 start 10 is beyond EOD, truncated [ 367.239496][ T1029] loop2: p26 start 10 is beyond EOD, truncated [ 367.245648][ T1029] loop2: p27 start 10 is beyond EOD, truncated [ 367.251790][ T1029] loop2: p28 start 10 is beyond EOD, truncated [ 367.258017][ T1029] loop2: p29 start 10 is beyond EOD, truncated [ 367.264156][ T1029] loop2: p30 start 10 is beyond EOD, truncated [ 367.270436][ T1029] loop2: p31 start 10 is beyond EOD, truncated [ 367.276598][ T1029] loop2: p32 start 10 is beyond EOD, truncated [ 367.283180][ T1029] loop2: p33 start 10 is beyond EOD, truncated [ 367.289407][ T1029] loop2: p34 start 10 is beyond EOD, truncated [ 367.295767][ T1029] loop2: p35 start 10 is beyond EOD, truncated [ 367.301965][ T1029] loop2: p36 start 10 is beyond EOD, truncated [ 367.308136][ T1029] loop2: p37 start 10 is beyond EOD, truncated [ 367.314273][ T1029] loop2: p38 start 10 is beyond EOD, truncated [ 367.320483][ T1029] loop2: p39 start 10 is beyond EOD, truncated [ 367.326728][ T1029] loop2: p40 start 10 is beyond EOD, truncated [ 367.332866][ T1029] loop2: p41 start 10 is beyond EOD, truncated [ 367.339056][ T1029] loop2: p42 start 10 is beyond EOD, truncated [ 367.345289][ T1029] loop2: p43 start 10 is beyond EOD, truncated [ 367.351468][ T1029] loop2: p44 start 10 is beyond EOD, truncated [ 367.357628][ T1029] loop2: p45 start 10 is beyond EOD, truncated [ 367.363856][ T1029] loop2: p46 start 10 is beyond EOD, truncated [ 367.370012][ T1029] loop2: p47 start 10 is beyond EOD, truncated [ 367.376441][ T1029] loop2: p48 start 10 is beyond EOD, truncated [ 367.382580][ T1029] loop2: p49 start 10 is beyond EOD, truncated [ 367.388742][ T1029] loop2: p50 start 10 is beyond EOD, truncated [ 367.394946][ T1029] loop2: p51 start 10 is beyond EOD, truncated [ 367.401100][ T1029] loop2: p52 start 10 is beyond EOD, truncated [ 367.407434][ T1029] loop2: p53 start 10 is beyond EOD, truncated [ 367.413667][ T1029] loop2: p54 start 10 is beyond EOD, truncated [ 367.419903][ T1029] loop2: p55 start 10 is beyond EOD, truncated [ 367.426079][ T1029] loop2: p56 start 10 is beyond EOD, truncated [ 367.432222][ T1029] loop2: p57 start 10 is beyond EOD, truncated [ 367.438434][ T1029] loop2: p58 start 10 is beyond EOD, truncated [ 367.444751][ T1029] loop2: p59 start 10 is beyond EOD, truncated [ 367.450920][ T1029] loop2: p60 start 10 is beyond EOD, truncated [ 367.457085][ T1029] loop2: p61 start 10 is beyond EOD, truncated [ 367.463302][ T1029] loop2: p62 start 10 is beyond EOD, truncated [ 367.469457][ T1029] loop2: p63 start 10 is beyond EOD, truncated [ 367.475636][ T1029] loop2: p64 start 10 is beyond EOD, truncated [ 367.481773][ T1029] loop2: p65 start 10 is beyond EOD, truncated [ 367.487945][ T1029] loop2: p66 start 10 is beyond EOD, truncated [ 367.494085][ T1029] loop2: p67 start 10 is beyond EOD, truncated [ 367.500236][ T1029] loop2: p68 start 10 is beyond EOD, truncated [ 367.506530][ T1029] loop2: p69 start 10 is beyond EOD, truncated [ 367.512734][ T1029] loop2: p70 start 10 is beyond EOD, truncated [ 367.518920][ T1029] loop2: p71 start 10 is beyond EOD, truncated [ 367.525146][ T1029] loop2: p72 start 10 is beyond EOD, truncated [ 367.531338][ T1029] loop2: p73 start 10 is beyond EOD, truncated [ 367.537501][ T1029] loop2: p74 start 10 is beyond EOD, truncated [ 367.543644][ T1029] loop2: p75 start 10 is beyond EOD, truncated [ 367.549812][ T1029] loop2: p76 start 10 is beyond EOD, truncated [ 367.555997][ T1029] loop2: p77 start 10 is beyond EOD, truncated [ 367.562193][ T1029] loop2: p78 start 10 is beyond EOD, truncated [ 367.568348][ T1029] loop2: p79 start 10 is beyond EOD, truncated [ 367.574568][ T1029] loop2: p80 start 10 is beyond EOD, truncated [ 367.580724][ T1029] loop2: p81 start 10 is beyond EOD, truncated [ 367.587839][ T1029] loop2: p82 start 10 is beyond EOD, truncated [ 367.593986][ T1029] loop2: p83 start 10 is beyond EOD, truncated [ 367.600168][ T1029] loop2: p84 start 10 is beyond EOD, truncated [ 367.606345][ T1029] loop2: p85 start 10 is beyond EOD, truncated [ 367.612487][ T1029] loop2: p86 start 10 is beyond EOD, truncated [ 367.618695][ T1029] loop2: p87 start 10 is beyond EOD, truncated [ 367.625004][ T1029] loop2: p88 start 10 is beyond EOD, truncated [ 367.631170][ T1029] loop2: p89 start 10 is beyond EOD, truncated [ 367.637525][ T1029] loop2: p90 start 10 is beyond EOD, truncated [ 367.643737][ T1029] loop2: p91 start 10 is beyond EOD, truncated [ 367.650011][ T1029] loop2: p92 start 10 is beyond EOD, truncated [ 367.656224][ T1029] loop2: p93 start 10 is beyond EOD, truncated [ 367.662371][ T1029] loop2: p94 start 10 is beyond EOD, truncated [ 367.668522][ T1029] loop2: p95 start 10 is beyond EOD, truncated [ 367.674668][ T1029] loop2: p96 start 10 is beyond EOD, truncated [ 367.680902][ T1029] loop2: p97 start 10 is beyond EOD, truncated [ 367.687066][ T1029] loop2: p98 start 10 is beyond EOD, truncated [ 367.693293][ T1029] loop2: p99 start 10 is beyond EOD, truncated [ 367.699467][ T1029] loop2: p100 start 10 is beyond EOD, truncated [ 367.705760][ T1029] loop2: p101 start 10 is beyond EOD, truncated [ 367.712043][ T1029] loop2: p102 start 10 is beyond EOD, truncated [ 367.718374][ T1029] loop2: p103 start 10 is beyond EOD, truncated [ 367.724598][ T1029] loop2: p104 start 10 is beyond EOD, truncated [ 367.730854][ T1029] loop2: p105 start 10 is beyond EOD, truncated [ 367.737091][ T1029] loop2: p106 start 10 is beyond EOD, truncated [ 367.743365][ T1029] loop2: p107 start 10 is beyond EOD, truncated [ 367.749608][ T1029] loop2: p108 start 10 is beyond EOD, truncated [ 367.755890][ T1029] loop2: p109 start 10 is beyond EOD, truncated [ 367.762115][ T1029] loop2: p110 start 10 is beyond EOD, truncated [ 367.768373][ T1029] loop2: p111 start 10 is beyond EOD, truncated [ 367.774647][ T1029] loop2: p112 start 10 is beyond EOD, truncated [ 367.780987][ T1029] loop2: p113 start 10 is beyond EOD, truncated [ 367.787252][ T1029] loop2: p114 start 10 is beyond EOD, truncated [ 367.793625][ T1029] loop2: p115 start 10 is beyond EOD, truncated [ 367.799895][ T1029] loop2: p116 start 10 is beyond EOD, truncated [ 367.806178][ T1029] loop2: p117 start 10 is beyond EOD, truncated [ 367.812413][ T1029] loop2: p118 start 10 is beyond EOD, truncated [ 367.818727][ T1029] loop2: p119 start 10 is beyond EOD, truncated [ 367.824956][ T1029] loop2: p120 start 10 is beyond EOD, truncated [ 367.831203][ T1029] loop2: p121 start 10 is beyond EOD, truncated [ 367.837580][ T1029] loop2: p122 start 10 is beyond EOD, truncated [ 367.843814][ T1029] loop2: p123 start 10 is beyond EOD, truncated [ 367.850119][ T1029] loop2: p124 start 10 is beyond EOD, truncated [ 367.856398][ T1029] loop2: p125 start 10 is beyond EOD, truncated [ 367.862633][ T1029] loop2: p126 start 10 is beyond EOD, truncated [ 367.868921][ T1029] loop2: p127 start 10 is beyond EOD, truncated [ 367.875170][ T1029] loop2: p128 start 10 is beyond EOD, truncated [ 367.881460][ T1029] loop2: p129 start 10 is beyond EOD, truncated [ 367.887992][ T1029] loop2: p130 start 10 is beyond EOD, truncated [ 367.894223][ T1029] loop2: p131 start 10 is beyond EOD, truncated [ 367.900492][ T1029] loop2: p132 start 10 is beyond EOD, truncated [ 367.906750][ T1029] loop2: p133 start 10 is beyond EOD, truncated [ 367.912981][ T1029] loop2: p134 start 10 is beyond EOD, truncated [ 367.919231][ T1029] loop2: p135 start 10 is beyond EOD, truncated [ 367.925646][ T1029] loop2: p136 start 10 is beyond EOD, truncated [ 367.931882][ T1029] loop2: p137 start 10 is beyond EOD, truncated [ 367.938158][ T1029] loop2: p138 start 10 is beyond EOD, truncated [ 367.944508][ T1029] loop2: p139 start 10 is beyond EOD, truncated [ 367.950772][ T1029] loop2: p140 start 10 is beyond EOD, truncated [ 367.957176][ T1029] loop2: p141 start 10 is beyond EOD, truncated [ 367.963472][ T1029] loop2: p142 start 10 is beyond EOD, truncated [ 367.969919][ T1029] loop2: p143 start 10 is beyond EOD, truncated [ 367.976176][ T1029] loop2: p144 start 10 is beyond EOD, truncated [ 367.982411][ T1029] loop2: p145 start 10 is beyond EOD, truncated [ 367.988696][ T1029] loop2: p146 start 10 is beyond EOD, truncated [ 367.994927][ T1029] loop2: p147 start 10 is beyond EOD, truncated [ 368.001284][ T1029] loop2: p148 start 10 is beyond EOD, truncated [ 368.007535][ T1029] loop2: p149 start 10 is beyond EOD, truncated [ 368.013888][ T1029] loop2: p150 start 10 is beyond EOD, truncated [ 368.020160][ T1029] loop2: p151 start 10 is beyond EOD, truncated [ 368.026879][ T1029] loop2: p152 start 10 is beyond EOD, truncated [ 368.033108][ T1029] loop2: p153 start 10 is beyond EOD, truncated [ 368.039391][ T1029] loop2: p154 start 10 is beyond EOD, truncated [ 368.045646][ T1029] loop2: p155 start 10 is beyond EOD, truncated [ 368.051882][ T1029] loop2: p156 start 10 is beyond EOD, truncated [ 368.058228][ T1029] loop2: p157 start 10 is beyond EOD, truncated [ 368.064456][ T1029] loop2: p158 start 10 is beyond EOD, truncated [ 368.070697][ T1029] loop2: p159 start 10 is beyond EOD, truncated [ 368.077033][ T1029] loop2: p160 start 10 is beyond EOD, truncated [ 368.083372][ T1029] loop2: p161 start 10 is beyond EOD, truncated [ 368.089749][ T1029] loop2: p162 start 10 is beyond EOD, truncated [ 368.096381][ T1029] loop2: p163 start 10 is beyond EOD, truncated [ 368.102606][ T1029] loop2: p164 start 10 is beyond EOD, truncated [ 368.109038][ T1029] loop2: p165 start 10 is beyond EOD, truncated [ 368.115265][ T1029] loop2: p166 start 10 is beyond EOD, truncated [ 368.121544][ T1029] loop2: p167 start 10 is beyond EOD, truncated [ 368.127796][ T1029] loop2: p168 start 10 is beyond EOD, truncated [ 368.134238][ T1029] loop2: p169 start 10 is beyond EOD, truncated [ 368.140497][ T1029] loop2: p170 start 10 is beyond EOD, truncated [ 368.146755][ T1029] loop2: p171 start 10 is beyond EOD, truncated [ 368.153022][ T1029] loop2: p172 start 10 is beyond EOD, truncated [ 368.159386][ T1029] loop2: p173 start 10 is beyond EOD, truncated [ 368.165726][ T1029] loop2: p174 start 10 is beyond EOD, truncated [ 368.171958][ T1029] loop2: p175 start 10 is beyond EOD, truncated [ 368.178208][ T1029] loop2: p176 start 10 is beyond EOD, truncated [ 368.184529][ T1029] loop2: p177 start 10 is beyond EOD, truncated [ 368.190780][ T1029] loop2: p178 start 10 is beyond EOD, truncated [ 368.197037][ T1029] loop2: p179 start 10 is beyond EOD, truncated [ 368.203270][ T1029] loop2: p180 start 10 is beyond EOD, truncated [ 368.209515][ T1029] loop2: p181 start 10 is beyond EOD, truncated [ 368.215781][ T1029] loop2: p182 start 10 is beyond EOD, truncated [ 368.222023][ T1029] loop2: p183 start 10 is beyond EOD, truncated [ 368.228278][ T1029] loop2: p184 start 10 is beyond EOD, truncated [ 368.234503][ T1029] loop2: p185 start 10 is beyond EOD, truncated [ 368.240739][ T1029] loop2: p186 start 10 is beyond EOD, truncated [ 368.246983][ T1029] loop2: p187 start 10 is beyond EOD, truncated [ 368.253927][ T1029] loop2: p188 start 10 is beyond EOD, truncated [ 368.260189][ T1029] loop2: p189 start 10 is beyond EOD, truncated [ 368.266441][ T1029] loop2: p190 start 10 is beyond EOD, truncated [ 368.272851][ T1029] loop2: p191 start 10 is beyond EOD, truncated [ 368.279115][ T1029] loop2: p192 start 10 is beyond EOD, truncated [ 368.285343][ T1029] loop2: p193 start 10 is beyond EOD, truncated [ 368.291592][ T1029] loop2: p194 start 10 is beyond EOD, truncated [ 368.297872][ T1029] loop2: p195 start 10 is beyond EOD, truncated [ 368.304102][ T1029] loop2: p196 start 10 is beyond EOD, truncated [ 368.310404][ T1029] loop2: p197 start 10 is beyond EOD, truncated [ 368.316667][ T1029] loop2: p198 start 10 is beyond EOD, truncated [ 368.322895][ T1029] loop2: p199 start 10 is beyond EOD, truncated [ 368.329150][ T1029] loop2: p200 start 10 is beyond EOD, truncated [ 368.335392][ T1029] loop2: p201 start 10 is beyond EOD, truncated [ 368.341759][ T1029] loop2: p202 start 10 is beyond EOD, truncated [ 368.348021][ T1029] loop2: p203 start 10 is beyond EOD, truncated [ 368.354300][ T1029] loop2: p204 start 10 is beyond EOD, truncated [ 368.364513][ T1029] loop2: p205 start 10 is beyond EOD, truncated [ 368.370871][ T1029] loop2: p206 start 10 is beyond EOD, truncated [ 368.377545][ T1029] loop2: p207 start 10 is beyond EOD, truncated [ 368.383984][ T1029] loop2: p208 start 10 is beyond EOD, truncated [ 368.390267][ T1029] loop2: p209 start 10 is beyond EOD, truncated [ 368.396622][ T1029] loop2: p210 start 10 is beyond EOD, truncated [ 368.402860][ T1029] loop2: p211 start 10 is beyond EOD, truncated [ 368.409207][ T1029] loop2: p212 start 10 is beyond EOD, truncated [ 368.415445][ T1029] loop2: p213 start 10 is beyond EOD, truncated [ 368.422225][ T1029] loop2: p214 start 10 is beyond EOD, truncated [ 368.428556][ T1029] loop2: p215 start 10 is beyond EOD, truncated [ 368.434800][ T1029] loop2: p216 start 10 is beyond EOD, truncated [ 368.441122][ T1029] loop2: p217 start 10 is beyond EOD, truncated [ 368.447381][ T1029] loop2: p218 start 10 is beyond EOD, truncated [ 368.453681][ T1029] loop2: p219 start 10 is beyond EOD, truncated [ 368.459925][ T1029] loop2: p220 start 10 is beyond EOD, truncated [ 368.466197][ T1029] loop2: p221 start 10 is beyond EOD, truncated [ 368.472519][ T1029] loop2: p222 start 10 is beyond EOD, truncated [ 368.478823][ T1029] loop2: p223 start 10 is beyond EOD, truncated [ 368.485139][ T1029] loop2: p224 start 10 is beyond EOD, truncated [ 368.491398][ T1029] loop2: p225 start 10 is beyond EOD, truncated [ 368.497656][ T1029] loop2: p226 start 10 is beyond EOD, truncated [ 368.503892][ T1029] loop2: p227 start 10 is beyond EOD, truncated [ 368.510150][ T1029] loop2: p228 start 10 is beyond EOD, truncated [ 368.516408][ T1029] loop2: p229 start 10 is beyond EOD, truncated [ 368.522648][ T1029] loop2: p230 start 10 is beyond EOD, truncated [ 368.528923][ T1029] loop2: p231 start 10 is beyond EOD, truncated [ 368.535262][ T1029] loop2: p232 start 10 is beyond EOD, truncated [ 368.541518][ T1029] loop2: p233 start 10 is beyond EOD, truncated [ 368.547820][ T1029] loop2: p234 start 10 is beyond EOD, truncated [ 368.554052][ T1029] loop2: p235 start 10 is beyond EOD, truncated [ 368.560315][ T1029] loop2: p236 start 10 is beyond EOD, truncated [ 368.566608][ T1029] loop2: p237 start 10 is beyond EOD, truncated [ 368.572843][ T1029] loop2: p238 start 10 is beyond EOD, truncated [ 368.579125][ T1029] loop2: p239 start 10 is beyond EOD, truncated [ 368.585415][ T1029] loop2: p240 start 10 is beyond EOD, truncated [ 368.591735][ T1029] loop2: p241 start 10 is beyond EOD, truncated [ 368.597985][ T1029] loop2: p242 start 10 is beyond EOD, truncated [ 368.604224][ T1029] loop2: p243 start 10 is beyond EOD, truncated [ 368.610497][ T1029] loop2: p244 start 10 is beyond EOD, truncated [ 368.616819][ T1029] loop2: p245 start 10 is beyond EOD, truncated [ 368.623103][ T1029] loop2: p246 start 10 is beyond EOD, truncated [ 368.629366][ T1029] loop2: p247 start 10 is beyond EOD, truncated [ 368.635643][ T1029] loop2: p248 start 10 is beyond EOD, truncated [ 368.641910][ T1029] loop2: p249 start 10 is beyond EOD, truncated [ 368.648172][ T1029] loop2: p250 start 10 is beyond EOD, truncated [ 368.654462][ T1029] loop2: p251 start 10 is beyond EOD, truncated [ 368.660860][ T1029] loop2: p252 start 10 is beyond EOD, truncated [ 368.667140][ T1029] loop2: p253 start 10 is beyond EOD, truncated [ 368.673417][ T1029] loop2: p254 start 10 is beyond EOD, truncated [ 368.679789][ T1029] loop2: p255 start 10 is beyond EOD, truncated [ 368.843820][T20049] loop2: detected capacity change from 0 to 1 [ 368.895122][T20049] loop2: p1 p2 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p2 [ 368.895664][T20049] loop2: p1 start 10 is beyond EOD, truncated [ 368.989408][T20049] loop2: p2 size 2 extends beyond EOD, truncated [ 369.005271][T20049] loop2: p3 start 225 is beyond EOD, truncated [ 369.011652][T20049] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 369.019762][T20049] loop2: p5 start 10 is beyond EOD, truncated [ 369.025882][T20049] loop2: p6 start 10 is beyond EOD, truncated [ 369.031978][T20049] loop2: p7 start 10 is beyond EOD, truncated [ 369.038067][T20049] loop2: p8 start 10 is beyond EOD, truncated [ 369.044619][T20049] loop2: p9 start 10 is beyond EOD, truncated [ 369.050699][T20049] loop2: p10 start 10 is beyond EOD, truncated [ 369.056867][T20049] loop2: p11 start 10 is beyond EOD, truncated [ 369.063021][T20049] loop2: p12 start 10 is beyond EOD, truncated [ 369.069183][T20049] loop2: p13 start 10 is beyond EOD, truncated [ 369.075325][T20049] loop2: p14 start 10 is beyond EOD, truncated [ 369.081578][T20049] loop2: p15 start 10 is beyond EOD, truncated [ 369.087755][T20049] loop2: p16 start 10 is beyond EOD, truncated [ 369.093910][T20049] loop2: p17 start 10 is beyond EOD, truncated [ 369.100142][T20049] loop2: p18 start 10 is beyond EOD, truncated [ 369.106338][T20049] loop2: p19 start 10 is beyond EOD, truncated [ 369.112495][T20049] loop2: p20 start 10 is beyond EOD, truncated [ 369.118790][T20049] loop2: p21 start 10 is beyond EOD, truncated [ 369.124936][T20049] loop2: p22 start 10 is beyond EOD, truncated [ 369.131137][T20049] loop2: p23 start 10 is beyond EOD, truncated [ 369.137303][T20049] loop2: p24 start 10 is beyond EOD, truncated [ 369.143800][T20049] loop2: p25 start 10 is beyond EOD, truncated [ 369.149977][T20049] loop2: p26 start 10 is beyond EOD, truncated [ 369.156133][T20049] loop2: p27 start 10 is beyond EOD, truncated [ 369.162290][T20049] loop2: p28 start 10 is beyond EOD, truncated [ 369.169117][T20049] loop2: p29 start 10 is beyond EOD, truncated [ 369.175257][T20049] loop2: p30 start 10 is beyond EOD, truncated [ 369.181416][T20049] loop2: p31 start 10 is beyond EOD, truncated [ 369.187612][T20049] loop2: p32 start 10 is beyond EOD, truncated [ 369.193809][T20049] loop2: p33 start 10 is beyond EOD, truncated [ 369.199967][T20049] loop2: p34 start 10 is beyond EOD, truncated [ 369.206175][T20049] loop2: p35 start 10 is beyond EOD, truncated [ 369.212328][T20049] loop2: p36 start 10 is beyond EOD, truncated [ 369.218525][T20049] loop2: p37 start 10 is beyond EOD, truncated [ 369.224926][T20049] loop2: p38 start 10 is beyond EOD, truncated [ 369.231105][T20049] loop2: p39 start 10 is beyond EOD, truncated [ 369.237277][T20049] loop2: p40 start 10 is beyond EOD, truncated [ 369.243422][T20049] loop2: p41 start 10 is beyond EOD, truncated [ 369.249593][T20049] loop2: p42 start 10 is beyond EOD, truncated [ 369.255758][T20049] loop2: p43 start 10 is beyond EOD, truncated [ 369.261897][T20049] loop2: p44 start 10 is beyond EOD, truncated [ 369.268060][T20049] loop2: p45 start 10 is beyond EOD, truncated [ 369.274247][T20049] loop2: p46 start 10 is beyond EOD, truncated [ 369.280466][T20049] loop2: p47 start 10 is beyond EOD, truncated [ 369.286806][T20049] loop2: p48 start 10 is beyond EOD, truncated [ 369.293002][T20049] loop2: p49 start 10 is beyond EOD, truncated [ 369.299358][T20049] loop2: p50 start 10 is beyond EOD, truncated [ 369.305528][T20049] loop2: p51 start 10 is beyond EOD, truncated [ 369.311808][T20049] loop2: p52 start 10 is beyond EOD, truncated [ 369.317967][T20049] loop2: p53 start 10 is beyond EOD, truncated [ 369.324130][T20049] loop2: p54 start 10 is beyond EOD, truncated [ 369.330366][T20049] loop2: p55 start 10 is beyond EOD, truncated [ 369.336794][T20049] loop2: p56 start 10 is beyond EOD, truncated [ 369.343055][T20049] loop2: p57 start 10 is beyond EOD, truncated [ 369.349240][T20049] loop2: p58 start 10 is beyond EOD, truncated [ 369.355441][T20049] loop2: p59 start 10 is beyond EOD, truncated [ 369.361584][T20049] loop2: p60 start 10 is beyond EOD, truncated [ 369.367782][T20049] loop2: p61 start 10 is beyond EOD, truncated [ 369.373927][T20049] loop2: p62 start 10 is beyond EOD, truncated [ 369.380105][T20049] loop2: p63 start 10 is beyond EOD, truncated [ 369.386275][T20049] loop2: p64 start 10 is beyond EOD, truncated [ 369.392424][T20049] loop2: p65 start 10 is beyond EOD, truncated [ 369.398617][T20049] loop2: p66 start 10 is beyond EOD, truncated [ 369.407067][T20049] loop2: p67 start 10 is beyond EOD, truncated [ 369.413316][T20049] loop2: p68 start 10 is beyond EOD, truncated [ 369.419487][T20049] loop2: p69 start 10 is beyond EOD, truncated [ 369.425666][T20049] loop2: p70 start 10 is beyond EOD, truncated [ 369.431808][T20049] loop2: p71 start 10 is beyond EOD, truncated [ 369.437980][T20049] loop2: p72 start 10 is beyond EOD, truncated [ 369.444225][T20049] loop2: p73 start 10 is beyond EOD, truncated [ 369.450417][T20049] loop2: p74 start 10 is beyond EOD, truncated [ 369.456680][T20049] loop2: p75 start 10 is beyond EOD, truncated [ 369.462891][T20049] loop2: p76 start 10 is beyond EOD, truncated [ 369.469049][T20049] loop2: p77 start 10 is beyond EOD, truncated [ 369.475192][T20049] loop2: p78 start 10 is beyond EOD, truncated [ 369.481357][T20049] loop2: p79 start 10 is beyond EOD, truncated [ 369.487525][T20049] loop2: p80 start 10 is beyond EOD, truncated [ 369.493744][T20049] loop2: p81 start 10 is beyond EOD, truncated [ 369.499913][T20049] loop2: p82 start 10 is beyond EOD, truncated [ 369.506253][T20049] loop2: p83 start 10 is beyond EOD, truncated [ 369.512440][T20049] loop2: p84 start 10 is beyond EOD, truncated [ 369.518606][T20049] loop2: p85 start 10 is beyond EOD, truncated [ 369.524779][T20049] loop2: p86 start 10 is beyond EOD, truncated [ 369.530936][T20049] loop2: p87 start 10 is beyond EOD, truncated [ 369.537214][T20049] loop2: p88 start 10 is beyond EOD, truncated [ 369.543365][T20049] loop2: p89 start 10 is beyond EOD, truncated [ 369.549597][T20049] loop2: p90 start 10 is beyond EOD, truncated [ 369.555789][T20049] loop2: p91 start 10 is beyond EOD, truncated [ 369.562023][T20049] loop2: p92 start 10 is beyond EOD, truncated [ 369.568256][T20049] loop2: p93 start 10 is beyond EOD, truncated [ 369.574543][T20049] loop2: p94 start 10 is beyond EOD, truncated [ 369.580723][T20049] loop2: p95 start 10 is beyond EOD, truncated [ 369.586911][T20049] loop2: p96 start 10 is beyond EOD, truncated [ 369.593070][T20049] loop2: p97 start 10 is beyond EOD, truncated [ 369.599246][T20049] loop2: p98 start 10 is beyond EOD, truncated [ 369.605435][T20049] loop2: p99 start 10 is beyond EOD, truncated [ 369.611675][T20049] loop2: p100 start 10 is beyond EOD, truncated [ 369.617935][T20049] loop2: p101 start 10 is beyond EOD, truncated [ 369.624177][T20049] loop2: p102 start 10 is beyond EOD, truncated [ 369.630460][T20049] loop2: p103 start 10 is beyond EOD, truncated [ 369.636712][T20049] loop2: p104 start 10 is beyond EOD, truncated [ 369.643065][T20049] loop2: p105 start 10 is beyond EOD, truncated [ 369.649328][T20049] loop2: p106 start 10 is beyond EOD, truncated [ 369.655580][T20049] loop2: p107 start 10 is beyond EOD, truncated [ 369.661882][T20049] loop2: p108 start 10 is beyond EOD, truncated [ 369.668231][T20049] loop2: p109 start 10 is beyond EOD, truncated [ 369.674499][T20049] loop2: p110 start 10 is beyond EOD, truncated [ 369.680861][T20049] loop2: p111 start 10 is beyond EOD, truncated [ 369.687127][T20049] loop2: p112 start 10 is beyond EOD, truncated [ 369.693385][T20049] loop2: p113 start 10 is beyond EOD, truncated [ 369.699988][T20049] loop2: p114 start 10 is beyond EOD, truncated [ 369.706329][T20049] loop2: p115 start 10 is beyond EOD, truncated [ 369.712652][T20049] loop2: p116 start 10 is beyond EOD, truncated [ 369.718984][T20049] loop2: p117 start 10 is beyond EOD, truncated [ 369.725217][T20049] loop2: p118 start 10 is beyond EOD, truncated [ 369.731524][T20049] loop2: p119 start 10 is beyond EOD, truncated [ 369.737824][T20049] loop2: p120 start 10 is beyond EOD, truncated [ 369.744592][T20049] loop2: p121 start 10 is beyond EOD, truncated [ 369.750918][T20049] loop2: p122 start 10 is beyond EOD, truncated [ 369.757343][T20049] loop2: p123 start 10 is beyond EOD, truncated [ 369.763572][T20049] loop2: p124 start 10 is beyond EOD, truncated [ 369.769844][T20049] loop2: p125 start 10 is beyond EOD, truncated [ 369.776200][T20049] loop2: p126 start 10 is beyond EOD, truncated [ 369.782438][T20049] loop2: p127 start 10 is beyond EOD, truncated [ 369.788704][T20049] loop2: p128 start 10 is beyond EOD, truncated [ 369.795114][T20049] loop2: p129 start 10 is beyond EOD, truncated [ 369.801364][T20049] loop2: p130 start 10 is beyond EOD, truncated [ 369.807616][T20049] loop2: p131 start 10 is beyond EOD, truncated [ 369.813846][T20049] loop2: p132 start 10 is beyond EOD, truncated [ 369.820258][T20049] loop2: p133 start 10 is beyond EOD, truncated [ 369.826509][T20049] loop2: p134 start 10 is beyond EOD, truncated [ 369.832737][T20049] loop2: p135 start 10 is beyond EOD, truncated [ 369.838983][T20049] loop2: p136 start 10 is beyond EOD, truncated [ 369.845214][T20049] loop2: p137 start 10 is beyond EOD, truncated [ 369.851481][T20049] loop2: p138 start 10 is beyond EOD, truncated [ 369.857740][T20049] loop2: p139 start 10 is beyond EOD, truncated [ 369.863973][T20049] loop2: p140 start 10 is beyond EOD, truncated [ 369.870253][T20049] loop2: p141 start 10 is beyond EOD, truncated [ 369.876512][T20049] loop2: p142 start 10 is beyond EOD, truncated [ 369.882844][T20049] loop2: p143 start 10 is beyond EOD, truncated [ 369.889157][T20049] loop2: p144 start 10 is beyond EOD, truncated [ 369.895540][T20049] loop2: p145 start 10 is beyond EOD, truncated [ 369.901771][T20049] loop2: p146 start 10 is beyond EOD, truncated [ 369.908039][T20049] loop2: p147 start 10 is beyond EOD, truncated [ 369.914402][T20049] loop2: p148 start 10 is beyond EOD, truncated [ 369.920667][T20049] loop2: p149 start 10 is beyond EOD, truncated [ 369.927204][T20049] loop2: p150 start 10 is beyond EOD, truncated [ 369.933434][T20049] loop2: p151 start 10 is beyond EOD, truncated [ 369.939788][T20049] loop2: p152 start 10 is beyond EOD, truncated [ 369.946048][T20049] loop2: p153 start 10 is beyond EOD, truncated [ 369.952288][T20049] loop2: p154 start 10 is beyond EOD, truncated [ 369.958543][T20049] loop2: p155 start 10 is beyond EOD, truncated [ 369.964776][T20049] loop2: p156 start 10 is beyond EOD, truncated [ 369.971040][T20049] loop2: p157 start 10 is beyond EOD, truncated [ 369.977319][T20049] loop2: p158 start 10 is beyond EOD, truncated [ 369.983639][T20049] loop2: p159 start 10 is beyond EOD, truncated [ 369.990101][T20049] loop2: p160 start 10 is beyond EOD, truncated [ 369.996416][T20049] loop2: p161 start 10 is beyond EOD, truncated [ 370.002768][T20049] loop2: p162 start 10 is beyond EOD, truncated [ 370.009142][T20049] loop2: p163 start 10 is beyond EOD, truncated [ 370.015478][T20049] loop2: p164 start 10 is beyond EOD, truncated [ 370.021715][T20049] loop2: p165 start 10 is beyond EOD, truncated [ 370.027977][T20049] loop2: p166 start 10 is beyond EOD, truncated [ 370.034250][T20049] loop2: p167 start 10 is beyond EOD, truncated [ 370.040513][T20049] loop2: p168 start 10 is beyond EOD, truncated [ 370.046780][T20049] loop2: p169 start 10 is beyond EOD, truncated [ 370.053047][T20049] loop2: p170 start 10 is beyond EOD, truncated [ 370.059312][T20049] loop2: p171 start 10 is beyond EOD, truncated [ 370.065594][T20049] loop2: p172 start 10 is beyond EOD, truncated [ 370.071862][T20049] loop2: p173 start 10 is beyond EOD, truncated [ 370.078115][T20049] loop2: p174 start 10 is beyond EOD, truncated [ 370.084580][T20049] loop2: p175 start 10 is beyond EOD, truncated [ 370.090849][T20049] loop2: p176 start 10 is beyond EOD, truncated [ 370.097108][T20049] loop2: p177 start 10 is beyond EOD, truncated [ 370.103339][T20049] loop2: p178 start 10 is beyond EOD, truncated [ 370.109623][T20049] loop2: p179 start 10 is beyond EOD, truncated [ 370.116016][T20049] loop2: p180 start 10 is beyond EOD, truncated [ 370.122260][T20049] loop2: p181 start 10 is beyond EOD, truncated [ 370.128514][T20049] loop2: p182 start 10 is beyond EOD, truncated [ 370.134750][T20049] loop2: p183 start 10 is beyond EOD, truncated [ 370.141101][T20049] loop2: p184 start 10 is beyond EOD, truncated [ 370.147444][T20049] loop2: p185 start 10 is beyond EOD, truncated [ 370.153673][T20049] loop2: p186 start 10 is beyond EOD, truncated [ 370.159964][T20049] loop2: p187 start 10 is beyond EOD, truncated [ 370.166257][T20049] loop2: p188 start 10 is beyond EOD, truncated [ 370.172487][T20049] loop2: p189 start 10 is beyond EOD, truncated [ 370.178859][T20049] loop2: p190 start 10 is beyond EOD, truncated [ 370.185090][T20049] loop2: p191 start 10 is beyond EOD, truncated [ 370.191340][T20049] loop2: p192 start 10 is beyond EOD, truncated [ 370.197687][T20049] loop2: p193 start 10 is beyond EOD, truncated [ 370.204208][T20049] loop2: p194 start 10 is beyond EOD, truncated [ 370.210546][T20049] loop2: p195 start 10 is beyond EOD, truncated [ 370.216849][T20049] loop2: p196 start 10 is beyond EOD, truncated [ 370.223086][T20049] loop2: p197 start 10 is beyond EOD, truncated [ 370.229356][T20049] loop2: p198 start 10 is beyond EOD, truncated [ 370.235674][T20049] loop2: p199 start 10 is beyond EOD, truncated [ 370.241906][T20049] loop2: p200 start 10 is beyond EOD, truncated [ 370.248205][T20049] loop2: p201 start 10 is beyond EOD, truncated [ 370.254435][T20049] loop2: p202 start 10 is beyond EOD, truncated [ 370.260870][T20049] loop2: p203 start 10 is beyond EOD, truncated [ 370.267153][T20049] loop2: p204 start 10 is beyond EOD, truncated [ 370.273391][T20049] loop2: p205 start 10 is beyond EOD, truncated [ 370.279654][T20049] loop2: p206 start 10 is beyond EOD, truncated [ 370.285898][T20049] loop2: p207 start 10 is beyond EOD, truncated [ 370.292131][T20049] loop2: p208 start 10 is beyond EOD, truncated [ 370.298490][T20049] loop2: p209 start 10 is beyond EOD, truncated [ 370.304720][T20049] loop2: p210 start 10 is beyond EOD, truncated [ 370.311164][T20049] loop2: p211 start 10 is beyond EOD, truncated [ 370.317418][T20049] loop2: p212 start 10 is beyond EOD, truncated [ 370.323671][T20049] loop2: p213 start 10 is beyond EOD, truncated [ 370.330026][T20049] loop2: p214 start 10 is beyond EOD, truncated [ 370.336353][T20049] loop2: p215 start 10 is beyond EOD, truncated [ 370.342585][T20049] loop2: p216 start 10 is beyond EOD, truncated [ 370.348844][T20049] loop2: p217 start 10 is beyond EOD, truncated [ 370.355074][T20049] loop2: p218 start 10 is beyond EOD, truncated [ 370.361366][T20049] loop2: p219 start 10 is beyond EOD, truncated [ 370.367886][T20049] loop2: p220 start 10 is beyond EOD, truncated [ 370.374155][T20049] loop2: p221 start 10 is beyond EOD, truncated [ 370.380415][T20049] loop2: p222 start 10 is beyond EOD, truncated [ 370.386666][T20049] loop2: p223 start 10 is beyond EOD, truncated [ 370.392896][T20049] loop2: p224 start 10 is beyond EOD, truncated [ 370.399182][T20049] loop2: p225 start 10 is beyond EOD, truncated [ 370.405497][T20049] loop2: p226 start 10 is beyond EOD, truncated [ 370.411871][T20049] loop2: p227 start 10 is beyond EOD, truncated [ 370.418957][T20049] loop2: p228 start 10 is beyond EOD, truncated [ 370.425236][T20049] loop2: p229 start 10 is beyond EOD, truncated [ 370.431515][T20049] loop2: p230 start 10 is beyond EOD, truncated [ 370.438047][T20049] loop2: p231 start 10 is beyond EOD, truncated [ 370.444768][T20049] loop2: p232 start 10 is beyond EOD, truncated [ 370.451124][T20049] loop2: p233 start 10 is beyond EOD, truncated [ 370.457372][T20049] loop2: p234 start 10 is beyond EOD, truncated [ 370.463599][T20049] loop2: p235 start 10 is beyond EOD, truncated [ 370.469979][T20049] loop2: p236 start 10 is beyond EOD, truncated [ 370.475317][ T25] kauditd_printk_skb: 67020 callbacks suppressed [ 370.475327][ T25] audit: type=1326 audit(1619743104.756:2249613): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 370.476283][T20049] loop2: p237 start 10 is beyond EOD, [ 370.485290][ T25] audit: type=1326 audit(1619743104.766:2249614): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 370.509169][T20049] truncated [ 370.509178][T20049] loop2: p238 start 10 is beyond EOD, [ 370.517450][ T25] audit: type=1326 audit(1619743104.766:2249615): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 370.538947][T20049] truncated [ 370.538954][T20049] loop2: p239 start 10 is beyond EOD, [ 370.543016][ T25] audit: type=1326 audit(1619743104.766:2249616): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 370.547541][T20049] truncated [ 370.547546][T20049] loop2: p240 start 10 is beyond EOD, truncated [ 370.572940][ T25] audit: type=1326 audit(1619743104.766:2249617): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 370.574958][T20049] loop2: p241 start 10 is beyond EOD, truncated [ 370.574973][T20049] loop2: p242 start 10 is beyond EOD, [ 370.581067][ T25] audit: type=1326 audit(1619743104.766:2249618): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 370.605503][T20049] truncated [ 370.605511][T20049] loop2: p243 start 10 is beyond EOD, truncated [ 370.605526][T20049] loop2: p244 start 10 is beyond EOD, truncated [ 370.605542][T20049] loop2: p245 start 10 is beyond EOD, truncated [ 370.610153][ T25] audit: type=1326 audit(1619743104.766:2249619): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 370.615006][T20049] loop2: p246 start 10 is beyond EOD, [ 370.640285][ T25] audit: type=1326 audit(1619743104.766:2249620): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 370.645940][T20049] truncated [ 370.645945][T20049] loop2: p247 start 10 is beyond EOD, [ 370.652352][ T25] audit: type=1326 audit(1619743104.766:2249621): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 370.675796][T20049] truncated [ 370.675806][T20049] loop2: p248 start 10 is beyond EOD, truncated [ 370.680343][ T25] audit: type=1326 audit(1619743104.766:2249622): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 370.685168][T20049] loop2: p249 start 10 is beyond EOD, truncated [ 370.685186][T20049] loop2: p250 start 10 is beyond EOD, truncated [ 370.832146][T20049] loop2: p251 start 10 is beyond EOD, truncated [ 370.838487][T20049] loop2: p252 start 10 is beyond EOD, truncated [ 370.844726][T20049] loop2: p253 start 10 is beyond EOD, truncated [ 370.851024][T20049] loop2: p254 start 10 is beyond EOD, truncated [ 370.857291][T20049] loop2: p255 start 10 is beyond EOD, truncated [ 370.870751][ T1029] loop2: p1 p2 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p2 [ 370.870885][ T1029] loop2: p1 start 10 is beyond EOD, truncated [ 370.963994][ T1029] loop2: p2 size 2 extends beyond EOD, truncated [ 370.971459][ T1029] loop2: p3 start 225 is beyond EOD, truncated [ 370.977688][ T1029] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 370.985954][ T1029] loop2: p5 start 10 is beyond EOD, truncated [ 370.992028][ T1029] loop2: p6 start 10 is beyond EOD, truncated [ 370.998145][ T1029] loop2: p7 start 10 is beyond EOD, truncated [ 371.004238][ T1029] loop2: p8 start 10 is beyond EOD, truncated [ 371.010326][ T1029] loop2: p9 start 10 is beyond EOD, truncated [ 371.016399][ T1029] loop2: p10 start 10 is beyond EOD, truncated [ 371.022656][ T1029] loop2: p11 start 10 is beyond EOD, truncated [ 371.029304][ T1029] loop2: p12 start 10 is beyond EOD, truncated [ 371.035659][ T1029] loop2: p13 start 10 is beyond EOD, truncated [ 371.041807][ T1029] loop2: p14 start 10 is beyond EOD, truncated [ 371.047989][ T1029] loop2: p15 start 10 is beyond EOD, truncated [ 371.054216][ T1029] loop2: p16 start 10 is beyond EOD, truncated [ 371.060415][ T1029] loop2: p17 start 10 is beyond EOD, truncated [ 371.066659][ T1029] loop2: p18 start 10 is beyond EOD, truncated [ 371.073580][ T1029] loop2: p19 start 10 is beyond EOD, truncated [ 371.079738][ T1029] loop2: p20 start 10 is beyond EOD, truncated [ 371.085902][ T1029] loop2: p21 start 10 is beyond EOD, truncated [ 371.092162][ T1029] loop2: p22 start 10 is beyond EOD, truncated [ 371.098764][ T1029] loop2: p23 start 10 is beyond EOD, truncated [ 371.104917][ T1029] loop2: p24 start 10 is beyond EOD, truncated [ 371.111093][ T1029] loop2: p25 start 10 is beyond EOD, truncated [ 371.117398][ T1029] loop2: p26 start 10 is beyond EOD, truncated [ 371.123778][ T1029] loop2: p27 start 10 is beyond EOD, truncated [ 371.130073][ T1029] loop2: p28 start 10 is beyond EOD, truncated [ 371.136330][ T1029] loop2: p29 start 10 is beyond EOD, truncated [ 371.142592][ T1029] loop2: p30 start 10 is beyond EOD, truncated [ 371.148779][ T1029] loop2: p31 start 10 is beyond EOD, truncated [ 371.154950][ T1029] loop2: p32 start 10 is beyond EOD, truncated [ 371.161149][ T1029] loop2: p33 start 10 is beyond EOD, truncated [ 371.167311][ T1029] loop2: p34 start 10 is beyond EOD, truncated [ 371.173451][ T1029] loop2: p35 start 10 is beyond EOD, truncated [ 371.179624][ T1029] loop2: p36 start 10 is beyond EOD, truncated [ 371.185790][ T1029] loop2: p37 start 10 is beyond EOD, truncated [ 371.191953][ T1029] loop2: p38 start 10 is beyond EOD, truncated [ 371.198110][ T1029] loop2: p39 start 10 is beyond EOD, truncated [ 371.204348][ T1029] loop2: p40 start 10 is beyond EOD, truncated [ 371.210512][ T1029] loop2: p41 start 10 is beyond EOD, truncated [ 371.216671][ T1029] loop2: p42 start 10 is beyond EOD, truncated [ 371.222839][ T1029] loop2: p43 start 10 is beyond EOD, truncated [ 371.229171][ T1029] loop2: p44 start 10 is beyond EOD, truncated [ 371.235410][ T1029] loop2: p45 start 10 is beyond EOD, truncated [ 371.241597][ T1029] loop2: p46 start 10 is beyond EOD, truncated [ 371.247752][ T1029] loop2: p47 start 10 is beyond EOD, truncated [ 371.253892][ T1029] loop2: p48 start 10 is beyond EOD, truncated [ 371.260135][ T1029] loop2: p49 start 10 is beyond EOD, truncated [ 371.266311][ T1029] loop2: p50 start 10 is beyond EOD, truncated [ 371.272450][ T1029] loop2: p51 start 10 is beyond EOD, truncated [ 371.278664][ T1029] loop2: p52 start 10 is beyond EOD, truncated [ 371.284813][ T1029] loop2: p53 start 10 is beyond EOD, truncated [ 371.291792][ T1029] loop2: p54 start 10 is beyond EOD, truncated [ 371.298037][ T1029] loop2: p55 start 10 is beyond EOD, truncated [ 371.304180][ T1029] loop2: p56 start 10 is beyond EOD, truncated [ 371.310348][ T1029] loop2: p57 start 10 is beyond EOD, truncated [ 371.316527][ T1029] loop2: p58 start 10 is beyond EOD, truncated [ 371.322676][ T1029] loop2: p59 start 10 is beyond EOD, truncated [ 371.328833][ T1029] loop2: p60 start 10 is beyond EOD, truncated [ 371.334980][ T1029] loop2: p61 start 10 is beyond EOD, truncated [ 371.341140][ T1029] loop2: p62 start 10 is beyond EOD, truncated [ 371.347296][ T1029] loop2: p63 start 10 is beyond EOD, truncated [ 371.353462][ T1029] loop2: p64 start 10 is beyond EOD, truncated [ 371.359630][ T1029] loop2: p65 start 10 is beyond EOD, truncated [ 371.365809][ T1029] loop2: p66 start 10 is beyond EOD, truncated [ 371.371949][ T1029] loop2: p67 start 10 is beyond EOD, truncated [ 371.378113][ T1029] loop2: p68 start 10 is beyond EOD, truncated [ 371.384254][ T1029] loop2: p69 start 10 is beyond EOD, truncated [ 371.390533][ T1029] loop2: p70 start 10 is beyond EOD, truncated [ 371.397314][ T1029] loop2: p71 start 10 is beyond EOD, truncated [ 371.403464][ T1029] loop2: p72 start 10 is beyond EOD, truncated [ 371.409712][ T1029] loop2: p73 start 10 is beyond EOD, truncated [ 371.415883][ T1029] loop2: p74 start 10 is beyond EOD, truncated [ 371.422068][ T1029] loop2: p75 start 10 is beyond EOD, truncated [ 371.428223][ T1029] loop2: p76 start 10 is beyond EOD, truncated [ 371.434446][ T1029] loop2: p77 start 10 is beyond EOD, truncated [ 371.440657][ T1029] loop2: p78 start 10 is beyond EOD, truncated [ 371.446841][ T1029] loop2: p79 start 10 is beyond EOD, truncated [ 371.452982][ T1029] loop2: p80 start 10 is beyond EOD, truncated [ 371.459146][ T1029] loop2: p81 start 10 is beyond EOD, truncated [ 371.465298][ T1029] loop2: p82 start 10 is beyond EOD, truncated [ 371.471452][ T1029] loop2: p83 start 10 is beyond EOD, truncated [ 371.477610][ T1029] loop2: p84 start 10 is beyond EOD, truncated [ 371.483752][ T1029] loop2: p85 start 10 is beyond EOD, truncated [ 371.489915][ T1029] loop2: p86 start 10 is beyond EOD, truncated [ 371.496146][ T1029] loop2: p87 start 10 is beyond EOD, truncated [ 371.502288][ T1029] loop2: p88 start 10 is beyond EOD, truncated [ 371.508479][ T1029] loop2: p89 start 10 is beyond EOD, truncated [ 371.514622][ T1029] loop2: p90 start 10 is beyond EOD, truncated [ 371.520788][ T1029] loop2: p91 start 10 is beyond EOD, truncated [ 371.526952][ T1029] loop2: p92 start 10 is beyond EOD, truncated [ 371.533095][ T1029] loop2: p93 start 10 is beyond EOD, truncated [ 371.539363][ T1029] loop2: p94 start 10 is beyond EOD, truncated [ 371.545615][ T1029] loop2: p95 start 10 is beyond EOD, truncated [ 371.551836][ T1029] loop2: p96 start 10 is beyond EOD, truncated [ 371.557999][ T1029] loop2: p97 start 10 is beyond EOD, truncated [ 371.564138][ T1029] loop2: p98 start 10 is beyond EOD, truncated [ 371.570357][ T1029] loop2: p99 start 10 is beyond EOD, truncated [ 371.576516][ T1029] loop2: p100 start 10 is beyond EOD, truncated [ 371.582748][ T1029] loop2: p101 start 10 is beyond EOD, truncated [ 371.588989][ T1029] loop2: p102 start 10 is beyond EOD, truncated [ 371.595236][ T1029] loop2: p103 start 10 is beyond EOD, truncated [ 371.601530][ T1029] loop2: p104 start 10 is beyond EOD, truncated [ 371.607780][ T1029] loop2: p105 start 10 is beyond EOD, truncated [ 371.614140][ T1029] loop2: p106 start 10 is beyond EOD, truncated [ 371.620377][ T1029] loop2: p107 start 10 is beyond EOD, truncated [ 371.626616][ T1029] loop2: p108 start 10 is beyond EOD, truncated [ 371.632844][ T1029] loop2: p109 start 10 is beyond EOD, truncated [ 371.639095][ T1029] loop2: p110 start 10 is beyond EOD, truncated [ 371.645373][ T1029] loop2: p111 start 10 is beyond EOD, truncated [ 371.651608][ T1029] loop2: p112 start 10 is beyond EOD, truncated [ 371.657879][ T1029] loop2: p113 start 10 is beyond EOD, truncated [ 371.664136][ T1029] loop2: p114 start 10 is beyond EOD, truncated [ 371.670466][ T1029] loop2: p115 start 10 is beyond EOD, truncated [ 371.676719][ T1029] loop2: p116 start 10 is beyond EOD, truncated [ 371.682961][ T1029] loop2: p117 start 10 is beyond EOD, truncated [ 371.689262][ T1029] loop2: p118 start 10 is beyond EOD, truncated [ 371.695515][ T1029] loop2: p119 start 10 is beyond EOD, truncated [ 371.701846][ T1029] loop2: p120 start 10 is beyond EOD, truncated [ 371.709396][ T1029] loop2: p121 start 10 is beyond EOD, truncated [ 371.715660][ T1029] loop2: p122 start 10 is beyond EOD, truncated [ 371.721961][ T1029] loop2: p123 start 10 is beyond EOD, truncated [ 371.728818][ T1029] loop2: p124 start 10 is beyond EOD, truncated [ 371.735071][ T1029] loop2: p125 start 10 is beyond EOD, truncated [ 371.741448][ T1029] loop2: p126 start 10 is beyond EOD, truncated [ 371.747699][ T1029] loop2: p127 start 10 is beyond EOD, truncated [ 371.753931][ T1029] loop2: p128 start 10 is beyond EOD, truncated [ 371.760246][ T1029] loop2: p129 start 10 is beyond EOD, truncated [ 371.766524][ T1029] loop2: p130 start 10 is beyond EOD, truncated [ 371.772760][ T1029] loop2: p131 start 10 is beyond EOD, truncated [ 371.779051][ T1029] loop2: p132 start 10 is beyond EOD, truncated [ 371.785308][ T1029] loop2: p133 start 10 is beyond EOD, truncated [ 371.791572][ T1029] loop2: p134 start 10 is beyond EOD, truncated [ 371.797825][ T1029] loop2: p135 start 10 is beyond EOD, truncated [ 371.804052][ T1029] loop2: p136 start 10 is beyond EOD, truncated [ 371.810344][ T1029] loop2: p137 start 10 is beyond EOD, truncated [ 371.816596][ T1029] loop2: p138 start 10 is beyond EOD, truncated [ 371.824668][ T1029] loop2: p139 start 10 is beyond EOD, truncated [ 371.830943][ T1029] loop2: p140 start 10 is beyond EOD, truncated [ 371.837462][ T1029] loop2: p141 start 10 is beyond EOD, truncated [ 371.843785][ T1029] loop2: p142 start 10 is beyond EOD, truncated [ 371.850053][ T1029] loop2: p143 start 10 is beyond EOD, truncated [ 371.856613][ T1029] loop2: p144 start 10 is beyond EOD, truncated [ 371.864182][ T1029] loop2: p145 start 10 is beyond EOD, truncated [ 371.870796][ T1029] loop2: p146 start 10 is beyond EOD, truncated [ 371.877289][ T1029] loop2: p147 start 10 is beyond EOD, truncated [ 371.883886][ T1029] loop2: p148 start 10 is beyond EOD, truncated [ 371.890226][ T1029] loop2: p149 start 10 is beyond EOD, truncated [ 371.896926][ T1029] loop2: p150 start 10 is beyond EOD, truncated [ 371.906878][ T1029] loop2: p151 start 10 is beyond EOD, truncated [ 371.914638][ T1029] loop2: p152 start 10 is beyond EOD, truncated [ 371.922235][ T1029] loop2: p153 start 10 is beyond EOD, truncated [ 371.928745][ T1029] loop2: p154 start 10 is beyond EOD, truncated [ 371.935039][ T1029] loop2: p155 start 10 is beyond EOD, truncated [ 371.941365][ T1029] loop2: p156 start 10 is beyond EOD, truncated [ 371.947610][ T1029] loop2: p157 start 10 is beyond EOD, truncated [ 371.954188][ T1029] loop2: p158 start 10 is beyond EOD, truncated [ 371.960885][ T1029] loop2: p159 start 10 is beyond EOD, truncated [ 371.969665][ T1029] loop2: p160 start 10 is beyond EOD, truncated [ 371.976087][ T1029] loop2: p161 start 10 is beyond EOD, truncated [ 371.982389][ T1029] loop2: p162 start 10 is beyond EOD, truncated [ 371.988650][ T1029] loop2: p163 start 10 is beyond EOD, truncated [ 371.994990][ T1029] loop2: p164 start 10 is beyond EOD, truncated [ 372.001263][ T1029] loop2: p165 start 10 is beyond EOD, truncated [ 372.007512][ T1029] loop2: p166 start 10 is beyond EOD, truncated [ 372.013756][ T1029] loop2: p167 start 10 is beyond EOD, truncated [ 372.020036][ T1029] loop2: p168 start 10 is beyond EOD, truncated [ 372.026379][ T1029] loop2: p169 start 10 is beyond EOD, truncated [ 372.032697][ T1029] loop2: p170 start 10 is beyond EOD, truncated [ 372.038941][ T1029] loop2: p171 start 10 is beyond EOD, truncated [ 372.045543][ T1029] loop2: p172 start 10 is beyond EOD, truncated [ 372.051826][ T1029] loop2: p173 start 10 is beyond EOD, truncated [ 372.058142][ T1029] loop2: p174 start 10 is beyond EOD, truncated [ 372.064386][ T1029] loop2: p175 start 10 is beyond EOD, truncated [ 372.070630][ T1029] loop2: p176 start 10 is beyond EOD, truncated [ 372.076957][ T1029] loop2: p177 start 10 is beyond EOD, truncated [ 372.083192][ T1029] loop2: p178 start 10 is beyond EOD, truncated [ 372.089647][ T1029] loop2: p179 start 10 is beyond EOD, truncated [ 372.096026][ T1029] loop2: p180 start 10 is beyond EOD, truncated [ 372.102357][ T1029] loop2: p181 start 10 is beyond EOD, truncated [ 372.108599][ T1029] loop2: p182 start 10 is beyond EOD, truncated [ 372.114834][ T1029] loop2: p183 start 10 is beyond EOD, truncated [ 372.121198][ T1029] loop2: p184 start 10 is beyond EOD, truncated [ 372.127452][ T1029] loop2: p185 start 10 is beyond EOD, truncated [ 372.133681][ T1029] loop2: p186 start 10 is beyond EOD, truncated [ 372.140009][ T1029] loop2: p187 start 10 is beyond EOD, truncated [ 372.146273][ T1029] loop2: p188 start 10 is beyond EOD, truncated [ 372.152502][ T1029] loop2: p189 start 10 is beyond EOD, truncated [ 372.158748][ T1029] loop2: p190 start 10 is beyond EOD, truncated [ 372.164975][ T1029] loop2: p191 start 10 is beyond EOD, truncated [ 372.171248][ T1029] loop2: p192 start 10 is beyond EOD, truncated [ 372.177494][ T1029] loop2: p193 start 10 is beyond EOD, truncated [ 372.183752][ T1029] loop2: p194 start 10 is beyond EOD, truncated [ 372.189995][ T1029] loop2: p195 start 10 is beyond EOD, truncated [ 372.196242][ T1029] loop2: p196 start 10 is beyond EOD, truncated [ 372.202472][ T1029] loop2: p197 start 10 is beyond EOD, truncated [ 372.208724][ T1029] loop2: p198 start 10 is beyond EOD, truncated [ 372.214945][ T1029] loop2: p199 start 10 is beyond EOD, truncated [ 372.221186][ T1029] loop2: p200 start 10 is beyond EOD, truncated [ 372.227423][ T1029] loop2: p201 start 10 is beyond EOD, truncated [ 372.233645][ T1029] loop2: p202 start 10 is beyond EOD, truncated [ 372.239974][ T1029] loop2: p203 start 10 is beyond EOD, truncated [ 372.246307][ T1029] loop2: p204 start 10 is beyond EOD, truncated [ 372.252639][ T1029] loop2: p205 start 10 is beyond EOD, truncated [ 372.259107][ T1029] loop2: p206 start 10 is beyond EOD, truncated [ 372.265444][ T1029] loop2: p207 start 10 is beyond EOD, truncated [ 372.271673][ T1029] loop2: p208 start 10 is beyond EOD, truncated [ 372.277920][ T1029] loop2: p209 start 10 is beyond EOD, truncated [ 372.284159][ T1029] loop2: p210 start 10 is beyond EOD, truncated [ 372.290431][ T1029] loop2: p211 start 10 is beyond EOD, truncated [ 372.296678][ T1029] loop2: p212 start 10 is beyond EOD, truncated [ 372.302897][ T1029] loop2: p213 start 10 is beyond EOD, truncated [ 372.309400][ T1029] loop2: p214 start 10 is beyond EOD, truncated [ 372.315728][ T1029] loop2: p215 start 10 is beyond EOD, truncated [ 372.321967][ T1029] loop2: p216 start 10 is beyond EOD, truncated [ 372.328304][ T1029] loop2: p217 start 10 is beyond EOD, truncated [ 372.335296][ T1029] loop2: p218 start 10 is beyond EOD, truncated [ 372.341554][ T1029] loop2: p219 start 10 is beyond EOD, truncated [ 372.347848][ T1029] loop2: p220 start 10 is beyond EOD, truncated [ 372.354071][ T1029] loop2: p221 start 10 is beyond EOD, truncated [ 372.360310][ T1029] loop2: p222 start 10 is beyond EOD, truncated [ 372.366578][ T1029] loop2: p223 start 10 is beyond EOD, truncated [ 372.372833][ T1029] loop2: p224 start 10 is beyond EOD, truncated [ 372.379165][ T1029] loop2: p225 start 10 is beyond EOD, truncated [ 372.385441][ T1029] loop2: p226 start 10 is beyond EOD, truncated [ 372.391671][ T1029] loop2: p227 start 10 is beyond EOD, truncated [ 372.398010][ T1029] loop2: p228 start 10 is beyond EOD, truncated [ 372.404371][ T1029] loop2: p229 start 10 is beyond EOD, truncated [ 372.410692][ T1029] loop2: p230 start 10 is beyond EOD, truncated [ 372.417064][ T1029] loop2: p231 start 10 is beyond EOD, truncated [ 372.423341][ T1029] loop2: p232 start 10 is beyond EOD, truncated [ 372.429598][ T1029] loop2: p233 start 10 is beyond EOD, truncated [ 372.435908][ T1029] loop2: p234 start 10 is beyond EOD, truncated [ 372.442202][ T1029] loop2: p235 start 10 is beyond EOD, truncated [ 372.448443][ T1029] loop2: p236 start 10 is beyond EOD, truncated [ 372.454700][ T1029] loop2: p237 start 10 is beyond EOD, truncated [ 372.460942][ T1029] loop2: p238 start 10 is beyond EOD, truncated [ 372.467220][ T1029] loop2: p239 start 10 is beyond EOD, truncated [ 372.473446][ T1029] loop2: p240 start 10 is beyond EOD, truncated [ 372.479699][ T1029] loop2: p241 start 10 is beyond EOD, truncated [ 372.485948][ T1029] loop2: p242 start 10 is beyond EOD, truncated [ 372.492235][ T1029] loop2: p243 start 10 is beyond EOD, truncated [ 372.498534][ T1029] loop2: p244 start 10 is beyond EOD, truncated [ 372.504805][ T1029] loop2: p245 start 10 is beyond EOD, truncated [ 372.511050][ T1029] loop2: p246 start 10 is beyond EOD, truncated [ 372.517358][ T1029] loop2: p247 start 10 is beyond EOD, truncated 00:38:26 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e1000000887700720030070082ffffff00000000008000da55aa", 0x40, 0x1c0}]) 00:38:26 executing program 5: set_mempolicy(0x2, &(0x7f0000000040)=0xc5d, 0x3) r0 = memfd_create(&(0x7f00000000c0)='!&\'^$]!\x00', 0x0) fcntl$lock(r0, 0x5, &(0x7f0000000100)={0x0, 0x4}) 00:38:26 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_type(r1, &(0x7f0000000140), 0xffffff1f) perf_event_open(&(0x7f000001d000)={0x1, 0x70}, 0x0, 0x0, r0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0x28000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) 00:38:26 executing program 3: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = dup(r0) ioctl$KDSIGACCEPT(r1, 0x5608, 0x37) 00:38:26 executing program 4: r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ffd000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000140)=@IORING_OP_WRITE={0x17, 0x0, 0x4008, @fd_index, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0x450c, 0x0, 0x0, 0x0, 0x0) 00:38:26 executing program 0: r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) io_setup(0x202, &(0x7f0000000200)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x1a000000}]) io_submit(r2, 0x1, &(0x7f0000000100)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x2}]) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) dup3(r3, r0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) [ 372.523585][ T1029] loop2: p248 start 10 is beyond EOD, truncated [ 372.529849][ T1029] loop2: p249 start 10 is beyond EOD, truncated [ 372.536094][ T1029] loop2: p250 start 10 is beyond EOD, truncated [ 372.542424][ T1029] loop2: p251 start 10 is beyond EOD, truncated [ 372.548776][ T1029] loop2: p252 start 10 is beyond EOD, truncated [ 372.555024][ T1029] loop2: p253 start 10 is beyond EOD, truncated [ 372.561260][ T1029] loop2: p254 start 10 is beyond EOD, truncated [ 372.567504][ T1029] loop2: p255 start 10 is beyond EOD, truncated 00:38:26 executing program 5: r0 = inotify_init1(0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0xc0189436, 0x3ffffd) 00:38:26 executing program 4: timer_create(0x0, &(0x7f0000003280)={0x0, 0x0, 0x1, @thr={0x0, 0x0}}, &(0x7f0000003380)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000180)={{}, {0x0, 0x3938700}}, &(0x7f00000001c0)) 00:38:26 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r2 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r2, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x80ffff) 00:38:26 executing program 5: syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) sendmsg$TEAM_CMD_OPTIONS_GET(r0, 0x0, 0x0) [ 372.672354][T20094] loop2: detected capacity change from 0 to 1 [ 372.741185][ T1029] loop2: p1 p2 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p2 [ 372.741344][ T1029] loop2: p1 start 10 is beyond EOD, truncated 00:38:27 executing program 4: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffff}) pwrite64(r3, &(0x7f0000000200)="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", 0x200, 0x0) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) [ 372.837253][ T1029] loop2: p2 size 2 extends beyond EOD, truncated [ 372.858619][ T1029] loop2: p3 start 225 is beyond EOD, truncated [ 372.864894][ T1029] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 372.875520][ T1029] loop2: p5 start 10 is beyond EOD, truncated [ 372.881693][ T1029] loop2: p6 start 10 is beyond EOD, truncated [ 372.887788][ T1029] loop2: p7 start 10 is beyond EOD, truncated [ 372.893847][ T1029] loop2: p8 start 10 is beyond EOD, truncated [ 372.899912][ T1029] loop2: p9 start 10 is beyond EOD, truncated [ 372.905985][ T1029] loop2: p10 start 10 is beyond EOD, truncated [ 372.912136][ T1029] loop2: p11 start 10 is beyond EOD, truncated [ 372.918285][ T1029] loop2: p12 start 10 is beyond EOD, truncated [ 372.924455][ T1029] loop2: p13 start 10 is beyond EOD, truncated [ 372.930634][ T1029] loop2: p14 start 10 is beyond EOD, truncated [ 372.936805][ T1029] loop2: p15 start 10 is beyond EOD, truncated [ 372.942980][ T1029] loop2: p16 start 10 is beyond EOD, truncated [ 372.949152][ T1029] loop2: p17 start 10 is beyond EOD, truncated [ 372.955326][ T1029] loop2: p18 start 10 is beyond EOD, truncated [ 372.961473][ T1029] loop2: p19 start 10 is beyond EOD, truncated [ 372.967648][ T1029] loop2: p20 start 10 is beyond EOD, truncated [ 372.973794][ T1029] loop2: p21 start 10 is beyond EOD, truncated [ 372.980001][ T1029] loop2: p22 start 10 is beyond EOD, truncated [ 372.986170][ T1029] loop2: p23 start 10 is beyond EOD, truncated [ 372.992323][ T1029] loop2: p24 start 10 is beyond EOD, truncated [ 372.998520][ T1029] loop2: p25 start 10 is beyond EOD, truncated [ 373.004666][ T1029] loop2: p26 start 10 is beyond EOD, truncated [ 373.010834][ T1029] loop2: p27 start 10 is beyond EOD, truncated [ 373.017020][ T1029] loop2: p28 start 10 is beyond EOD, truncated [ 373.023219][ T1029] loop2: p29 start 10 is beyond EOD, truncated [ 373.029406][ T1029] loop2: p30 start 10 is beyond EOD, truncated [ 373.035715][ T1029] loop2: p31 start 10 is beyond EOD, truncated [ 373.042006][ T1029] loop2: p32 start 10 is beyond EOD, truncated [ 373.048174][ T1029] loop2: p33 start 10 is beyond EOD, truncated [ 373.054319][ T1029] loop2: p34 start 10 is beyond EOD, truncated [ 373.060502][ T1029] loop2: p35 start 10 is beyond EOD, truncated [ 373.067281][ T1029] loop2: p36 start 10 is beyond EOD, truncated [ 373.075701][ T1029] loop2: p37 start 10 is beyond EOD, truncated [ 373.081939][ T1029] loop2: p38 start 10 is beyond EOD, truncated [ 373.088132][ T1029] loop2: p39 start 10 is beyond EOD, truncated [ 373.094331][ T1029] loop2: p40 start 10 is beyond EOD, truncated [ 373.100663][ T1029] loop2: p41 start 10 is beyond EOD, truncated [ 373.106909][ T1029] loop2: p42 start 10 is beyond EOD, truncated [ 373.113233][ T1029] loop2: p43 start 10 is beyond EOD, truncated [ 373.119420][ T1029] loop2: p44 start 10 is beyond EOD, truncated [ 373.125946][ T1029] loop2: p45 start 10 is beyond EOD, truncated [ 373.132127][ T1029] loop2: p46 start 10 is beyond EOD, truncated [ 373.138354][ T1029] loop2: p47 start 10 is beyond EOD, truncated [ 373.144508][ T1029] loop2: p48 start 10 is beyond EOD, truncated [ 373.150866][ T1029] loop2: p49 start 10 is beyond EOD, truncated [ 373.157059][ T1029] loop2: p50 start 10 is beyond EOD, truncated [ 373.164512][ T1029] loop2: p51 start 10 is beyond EOD, truncated [ 373.170693][ T1029] loop2: p52 start 10 is beyond EOD, truncated [ 373.176929][ T1029] loop2: p53 start 10 is beyond EOD, truncated [ 373.183107][ T1029] loop2: p54 start 10 is beyond EOD, truncated [ 373.189515][ T1029] loop2: p55 start 10 is beyond EOD, truncated [ 373.195815][ T1029] loop2: p56 start 10 is beyond EOD, truncated [ 373.201963][ T1029] loop2: p57 start 10 is beyond EOD, truncated [ 373.208125][ T1029] loop2: p58 start 10 is beyond EOD, truncated [ 373.214266][ T1029] loop2: p59 start 10 is beyond EOD, truncated [ 373.220854][ T1029] loop2: p60 start 10 is beyond EOD, truncated [ 373.227019][ T1029] loop2: p61 start 10 is beyond EOD, truncated [ 373.234208][ T1029] loop2: p62 start 10 is beyond EOD, truncated [ 373.240372][ T1029] loop2: p63 start 10 is beyond EOD, truncated [ 373.246537][ T1029] loop2: p64 start 10 is beyond EOD, truncated [ 373.252689][ T1029] loop2: p65 start 10 is beyond EOD, truncated [ 373.258876][ T1029] loop2: p66 start 10 is beyond EOD, truncated [ 373.265081][ T1029] loop2: p67 start 10 is beyond EOD, truncated [ 373.271229][ T1029] loop2: p68 start 10 is beyond EOD, truncated [ 373.277404][ T1029] loop2: p69 start 10 is beyond EOD, truncated [ 373.283603][ T1029] loop2: p70 start 10 is beyond EOD, truncated [ 373.289814][ T1029] loop2: p71 start 10 is beyond EOD, truncated [ 373.296006][ T1029] loop2: p72 start 10 is beyond EOD, truncated [ 373.302164][ T1029] loop2: p73 start 10 is beyond EOD, truncated [ 373.308352][ T1029] loop2: p74 start 10 is beyond EOD, truncated [ 373.314681][ T1029] loop2: p75 start 10 is beyond EOD, truncated [ 373.321095][ T1029] loop2: p76 start 10 is beyond EOD, truncated [ 373.327432][ T1029] loop2: p77 start 10 is beyond EOD, truncated [ 373.333696][ T1029] loop2: p78 start 10 is beyond EOD, truncated 00:38:27 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_type(r1, &(0x7f0000000140), 0xffffff1f) perf_event_open(&(0x7f000001d000)={0x1, 0x70}, 0x0, 0x0, r0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0x28000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) [ 373.339907][ T1029] loop2: p79 start 10 is beyond EOD, truncated [ 373.346230][ T1029] loop2: p80 start 10 is beyond EOD, truncated [ 373.352555][ T1029] loop2: p81 start 10 is beyond EOD, truncated [ 373.358733][ T1029] loop2: p82 start 10 is beyond EOD, truncated [ 373.364954][ T1029] loop2: p83 start 10 is beyond EOD, truncated [ 373.371098][ T1029] loop2: p84 start 10 is beyond EOD, truncated [ 373.377296][ T1029] loop2: p85 start 10 is beyond EOD, truncated [ 373.383442][ T1029] loop2: p86 start 10 is beyond EOD, truncated [ 373.389614][ T1029] loop2: p87 start 10 is beyond EOD, truncated [ 373.395791][ T1029] loop2: p88 start 10 is beyond EOD, truncated [ 373.402003][ T1029] loop2: p89 start 10 is beyond EOD, truncated [ 373.408169][ T1029] loop2: p90 start 10 is beyond EOD, truncated [ 373.414358][ T1029] loop2: p91 start 10 is beyond EOD, truncated [ 373.420560][ T1029] loop2: p92 start 10 is beyond EOD, truncated [ 373.426744][ T1029] loop2: p93 start 10 is beyond EOD, truncated [ 373.432892][ T1029] loop2: p94 start 10 is beyond EOD, truncated [ 373.439223][ T1029] loop2: p95 start 10 is beyond EOD, truncated [ 373.445399][ T1029] loop2: p96 start 10 is beyond EOD, truncated [ 373.451576][ T1029] loop2: p97 start 10 is beyond EOD, truncated [ 373.457755][ T1029] loop2: p98 start 10 is beyond EOD, truncated [ 373.463941][ T1029] loop2: p99 start 10 is beyond EOD, truncated [ 373.470124][ T1029] loop2: p100 start 10 is beyond EOD, truncated [ 373.476479][ T1029] loop2: p101 start 10 is beyond EOD, truncated [ 373.482758][ T1029] loop2: p102 start 10 is beyond EOD, truncated [ 373.489020][ T1029] loop2: p103 start 10 is beyond EOD, truncated [ 373.495287][ T1029] loop2: p104 start 10 is beyond EOD, truncated [ 373.502543][ T1029] loop2: p105 start 10 is beyond EOD, truncated [ 373.508980][ T1029] loop2: p106 start 10 is beyond EOD, truncated [ 373.515814][ T1029] loop2: p107 start 10 is beyond EOD, truncated [ 373.522045][ T1029] loop2: p108 start 10 is beyond EOD, truncated [ 373.528305][ T1029] loop2: p109 start 10 is beyond EOD, truncated [ 373.534535][ T1029] loop2: p110 start 10 is beyond EOD, truncated [ 373.540814][ T1029] loop2: p111 start 10 is beyond EOD, truncated [ 373.547071][ T1029] loop2: p112 start 10 is beyond EOD, truncated [ 373.553312][ T1029] loop2: p113 start 10 is beyond EOD, truncated [ 373.559568][ T1029] loop2: p114 start 10 is beyond EOD, truncated [ 373.565840][ T1029] loop2: p115 start 10 is beyond EOD, truncated [ 373.572076][ T1029] loop2: p116 start 10 is beyond EOD, truncated [ 373.578337][ T1029] loop2: p117 start 10 is beyond EOD, truncated [ 373.584612][ T1029] loop2: p118 start 10 is beyond EOD, truncated [ 373.590888][ T1029] loop2: p119 start 10 is beyond EOD, truncated [ 373.597171][ T1029] loop2: p120 start 10 is beyond EOD, truncated [ 373.603404][ T1029] loop2: p121 start 10 is beyond EOD, truncated [ 373.609653][ T1029] loop2: p122 start 10 is beyond EOD, truncated [ 373.615902][ T1029] loop2: p123 start 10 is beyond EOD, truncated [ 373.622134][ T1029] loop2: p124 start 10 is beyond EOD, truncated [ 373.628406][ T1029] loop2: p125 start 10 is beyond EOD, truncated [ 373.634719][ T1029] loop2: p126 start 10 is beyond EOD, truncated [ 373.641054][ T1029] loop2: p127 start 10 is beyond EOD, truncated [ 373.649283][ T1029] loop2: p128 start 10 is beyond EOD, truncated [ 373.655546][ T1029] loop2: p129 start 10 is beyond EOD, truncated [ 373.661782][ T1029] loop2: p130 start 10 is beyond EOD, truncated [ 373.668129][ T1029] loop2: p131 start 10 is beyond EOD, truncated [ 373.674385][ T1029] loop2: p132 start 10 is beyond EOD, truncated [ 373.680714][ T1029] loop2: p133 start 10 is beyond EOD, truncated [ 373.687029][ T1029] loop2: p134 start 10 is beyond EOD, truncated [ 373.693353][ T1029] loop2: p135 start 10 is beyond EOD, truncated [ 373.699608][ T1029] loop2: p136 start 10 is beyond EOD, truncated [ 373.706437][ T1029] loop2: p137 start 10 is beyond EOD, truncated [ 373.713285][ T1029] loop2: p138 start 10 is beyond EOD, truncated [ 373.719561][ T1029] loop2: p139 start 10 is beyond EOD, truncated [ 373.725812][ T1029] loop2: p140 start 10 is beyond EOD, truncated [ 373.732092][ T1029] loop2: p141 start 10 is beyond EOD, truncated [ 373.738346][ T1029] loop2: p142 start 10 is beyond EOD, truncated [ 373.744665][ T1029] loop2: p143 start 10 is beyond EOD, truncated [ 373.750933][ T1029] loop2: p144 start 10 is beyond EOD, truncated [ 373.757361][ T1029] loop2: p145 start 10 is beyond EOD, truncated [ 373.763595][ T1029] loop2: p146 start 10 is beyond EOD, truncated [ 373.770218][ T1029] loop2: p147 start 10 is beyond EOD, truncated [ 373.776742][ T1029] loop2: p148 start 10 is beyond EOD, truncated [ 373.782973][ T1029] loop2: p149 start 10 is beyond EOD, truncated [ 373.789352][ T1029] loop2: p150 start 10 is beyond EOD, truncated [ 373.796205][ T1029] loop2: p151 start 10 is beyond EOD, truncated [ 373.802783][ T1029] loop2: p152 start 10 is beyond EOD, truncated [ 373.809038][ T1029] loop2: p153 start 10 is beyond EOD, truncated [ 373.815290][ T1029] loop2: p154 start 10 is beyond EOD, truncated [ 373.821765][ T1029] loop2: p155 start 10 is beyond EOD, truncated [ 373.828022][ T1029] loop2: p156 start 10 is beyond EOD, truncated [ 373.834320][ T1029] loop2: p157 start 10 is beyond EOD, truncated [ 373.840631][ T1029] loop2: p158 start 10 is beyond EOD, truncated [ 373.847255][ T1029] loop2: p159 start 10 is beyond EOD, truncated [ 373.854449][ T1029] loop2: p160 start 10 is beyond EOD, truncated [ 373.860903][ T1029] loop2: p161 start 10 is beyond EOD, truncated [ 373.867157][ T1029] loop2: p162 start 10 is beyond EOD, truncated [ 373.873386][ T1029] loop2: p163 start 10 is beyond EOD, truncated [ 373.879719][ T1029] loop2: p164 start 10 is beyond EOD, truncated [ 373.886141][ T1029] loop2: p165 start 10 is beyond EOD, truncated [ 373.892483][ T1029] loop2: p166 start 10 is beyond EOD, truncated [ 373.899255][ T1029] loop2: p167 start 10 is beyond EOD, truncated [ 373.905528][ T1029] loop2: p168 start 10 is beyond EOD, truncated [ 373.912113][ T1029] loop2: p169 start 10 is beyond EOD, truncated [ 373.918809][ T1029] loop2: p170 start 10 is beyond EOD, truncated [ 373.925055][ T1029] loop2: p171 start 10 is beyond EOD, truncated [ 373.931903][ T1029] loop2: p172 start 10 is beyond EOD, truncated [ 373.938241][ T1029] loop2: p173 start 10 is beyond EOD, truncated [ 373.944473][ T1029] loop2: p174 start 10 is beyond EOD, truncated [ 373.950729][ T1029] loop2: p175 start 10 is beyond EOD, truncated [ 373.956990][ T1029] loop2: p176 start 10 is beyond EOD, truncated [ 373.963234][ T1029] loop2: p177 start 10 is beyond EOD, truncated [ 373.970102][ T1029] loop2: p178 start 10 is beyond EOD, truncated [ 373.976528][ T1029] loop2: p179 start 10 is beyond EOD, truncated [ 373.982762][ T1029] loop2: p180 start 10 is beyond EOD, truncated [ 373.989048][ T1029] loop2: p181 start 10 is beyond EOD, truncated [ 373.995308][ T1029] loop2: p182 start 10 is beyond EOD, truncated [ 374.001566][ T1029] loop2: p183 start 10 is beyond EOD, truncated [ 374.007822][ T1029] loop2: p184 start 10 is beyond EOD, truncated [ 374.014060][ T1029] loop2: p185 start 10 is beyond EOD, truncated [ 374.020314][ T1029] loop2: p186 start 10 is beyond EOD, truncated [ 374.026574][ T1029] loop2: p187 start 10 is beyond EOD, truncated [ 374.032808][ T1029] loop2: p188 start 10 is beyond EOD, truncated [ 374.039057][ T1029] loop2: p189 start 10 is beyond EOD, truncated [ 374.045579][ T1029] loop2: p190 start 10 is beyond EOD, truncated [ 374.051896][ T1029] loop2: p191 start 10 is beyond EOD, truncated [ 374.058140][ T1029] loop2: p192 start 10 is beyond EOD, truncated [ 374.064370][ T1029] loop2: p193 start 10 is beyond EOD, truncated [ 374.072479][ T1029] loop2: p194 start 10 is beyond EOD, truncated [ 374.078810][ T1029] loop2: p195 start 10 is beyond EOD, truncated [ 374.085059][ T1029] loop2: p196 start 10 is beyond EOD, truncated [ 374.091368][ T1029] loop2: p197 start 10 is beyond EOD, truncated [ 374.097644][ T1029] loop2: p198 start 10 is beyond EOD, truncated [ 374.103877][ T1029] loop2: p199 start 10 is beyond EOD, truncated [ 374.110144][ T1029] loop2: p200 start 10 is beyond EOD, truncated [ 374.116468][ T1029] loop2: p201 start 10 is beyond EOD, truncated [ 374.122703][ T1029] loop2: p202 start 10 is beyond EOD, truncated [ 374.128952][ T1029] loop2: p203 start 10 is beyond EOD, truncated [ 374.135235][ T1029] loop2: p204 start 10 is beyond EOD, truncated [ 374.141470][ T1029] loop2: p205 start 10 is beyond EOD, truncated [ 374.147735][ T1029] loop2: p206 start 10 is beyond EOD, truncated [ 374.153974][ T1029] loop2: p207 start 10 is beyond EOD, truncated [ 374.160343][ T1029] loop2: p208 start 10 is beyond EOD, truncated [ 374.166605][ T1029] loop2: p209 start 10 is beyond EOD, truncated [ 374.173224][ T1029] loop2: p210 start 10 is beyond EOD, truncated [ 374.179477][ T1029] loop2: p211 start 10 is beyond EOD, truncated [ 374.186782][ T1029] loop2: p212 start 10 is beyond EOD, truncated [ 374.193108][ T1029] loop2: p213 start 10 is beyond EOD, truncated [ 374.199449][ T1029] loop2: p214 start 10 is beyond EOD, truncated [ 374.205714][ T1029] loop2: p215 start 10 is beyond EOD, truncated [ 374.211953][ T1029] loop2: p216 start 10 is beyond EOD, truncated [ 374.218195][ T1029] loop2: p217 start 10 is beyond EOD, truncated [ 374.224422][ T1029] loop2: p218 start 10 is beyond EOD, truncated [ 374.230673][ T1029] loop2: p219 start 10 is beyond EOD, truncated [ 374.236927][ T1029] loop2: p220 start 10 is beyond EOD, truncated [ 374.243159][ T1029] loop2: p221 start 10 is beyond EOD, truncated [ 374.249435][ T1029] loop2: p222 start 10 is beyond EOD, truncated [ 374.255761][ T1029] loop2: p223 start 10 is beyond EOD, truncated [ 374.261995][ T1029] loop2: p224 start 10 is beyond EOD, truncated [ 374.268236][ T1029] loop2: p225 start 10 is beyond EOD, truncated [ 374.274467][ T1029] loop2: p226 start 10 is beyond EOD, truncated [ 374.280724][ T1029] loop2: p227 start 10 is beyond EOD, truncated [ 374.287040][ T1029] loop2: p228 start 10 is beyond EOD, truncated [ 374.293322][ T1029] loop2: p229 start 10 is beyond EOD, truncated [ 374.299640][ T1029] loop2: p230 start 10 is beyond EOD, truncated [ 374.305978][ T1029] loop2: p231 start 10 is beyond EOD, truncated [ 374.312210][ T1029] loop2: p232 start 10 is beyond EOD, truncated [ 374.318553][ T1029] loop2: p233 start 10 is beyond EOD, truncated [ 374.324834][ T1029] loop2: p234 start 10 is beyond EOD, truncated [ 374.331073][ T1029] loop2: p235 start 10 is beyond EOD, truncated [ 374.337335][ T1029] loop2: p236 start 10 is beyond EOD, truncated [ 374.343612][ T1029] loop2: p237 start 10 is beyond EOD, truncated [ 374.349865][ T1029] loop2: p238 start 10 is beyond EOD, truncated [ 374.356112][ T1029] loop2: p239 start 10 is beyond EOD, truncated [ 374.362338][ T1029] loop2: p240 start 10 is beyond EOD, truncated [ 374.368682][ T1029] loop2: p241 start 10 is beyond EOD, truncated [ 374.374945][ T1029] loop2: p242 start 10 is beyond EOD, truncated [ 374.381177][ T1029] loop2: p243 start 10 is beyond EOD, truncated [ 374.387442][ T1029] loop2: p244 start 10 is beyond EOD, truncated [ 374.393675][ T1029] loop2: p245 start 10 is beyond EOD, truncated [ 374.399953][ T1029] loop2: p246 start 10 is beyond EOD, truncated [ 374.406210][ T1029] loop2: p247 start 10 is beyond EOD, truncated [ 374.412441][ T1029] loop2: p248 start 10 is beyond EOD, truncated [ 374.418683][ T1029] loop2: p249 start 10 is beyond EOD, truncated [ 374.424955][ T1029] loop2: p250 start 10 is beyond EOD, truncated [ 374.431281][ T1029] loop2: p251 start 10 is beyond EOD, truncated [ 374.437670][ T1029] loop2: p252 start 10 is beyond EOD, truncated [ 374.444253][ T1029] loop2: p253 start 10 is beyond EOD, truncated [ 374.450508][ T1029] loop2: p254 start 10 is beyond EOD, truncated [ 374.456822][ T1029] loop2: p255 start 10 is beyond EOD, truncated [ 374.471587][T20094] loop2: p1 p2 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p2 [ 374.471818][T20094] loop2: p1 start 10 is beyond EOD, truncated [ 374.565035][T20094] loop2: p2 size 2 extends beyond EOD, truncated [ 374.576107][T20094] loop2: p3 start 225 is beyond EOD, truncated [ 374.582286][T20094] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 374.604681][T20094] loop2: p5 start 10 is beyond EOD, truncated [ 374.610818][T20094] loop2: p6 start 10 is beyond EOD, truncated [ 374.616890][T20094] loop2: p7 start 10 is beyond EOD, truncated [ 374.622946][T20094] loop2: p8 start 10 is beyond EOD, truncated [ 374.629080][T20094] loop2: p9 start 10 is beyond EOD, truncated [ 374.635264][T20094] loop2: p10 start 10 is beyond EOD, truncated [ 374.641492][T20094] loop2: p11 start 10 is beyond EOD, truncated [ 374.647658][T20094] loop2: p12 start 10 is beyond EOD, truncated [ 374.653803][T20094] loop2: p13 start 10 is beyond EOD, truncated [ 374.659975][T20094] loop2: p14 start 10 is beyond EOD, truncated [ 374.666304][T20094] loop2: p15 start 10 is beyond EOD, truncated [ 374.672448][T20094] loop2: p16 start 10 is beyond EOD, truncated [ 374.678615][T20094] loop2: p17 start 10 is beyond EOD, truncated [ 374.684760][T20094] loop2: p18 start 10 is beyond EOD, truncated [ 374.690919][T20094] loop2: p19 start 10 is beyond EOD, truncated [ 374.697079][T20094] loop2: p20 start 10 is beyond EOD, truncated [ 374.703274][T20094] loop2: p21 start 10 is beyond EOD, truncated [ 374.709579][T20094] loop2: p22 start 10 is beyond EOD, truncated [ 374.715851][T20094] loop2: p23 start 10 is beyond EOD, truncated [ 374.722003][T20094] loop2: p24 start 10 is beyond EOD, truncated [ 374.728163][T20094] loop2: p25 start 10 is beyond EOD, truncated [ 374.734318][T20094] loop2: p26 start 10 is beyond EOD, truncated [ 374.740584][T20094] loop2: p27 start 10 is beyond EOD, truncated [ 374.746748][T20094] loop2: p28 start 10 is beyond EOD, truncated [ 374.753060][T20094] loop2: p29 start 10 is beyond EOD, truncated [ 374.759227][T20094] loop2: p30 start 10 is beyond EOD, truncated [ 374.765397][T20094] loop2: p31 start 10 is beyond EOD, truncated [ 374.771547][T20094] loop2: p32 start 10 is beyond EOD, truncated [ 374.777709][T20094] loop2: p33 start 10 is beyond EOD, truncated [ 374.783855][T20094] loop2: p34 start 10 is beyond EOD, truncated [ 374.790058][T20094] loop2: p35 start 10 is beyond EOD, truncated [ 374.796224][T20094] loop2: p36 start 10 is beyond EOD, truncated [ 374.802366][T20094] loop2: p37 start 10 is beyond EOD, truncated [ 374.808615][T20094] loop2: p38 start 10 is beyond EOD, truncated [ 374.814905][T20094] loop2: p39 start 10 is beyond EOD, truncated [ 374.821063][T20094] loop2: p40 start 10 is beyond EOD, truncated [ 374.827231][T20094] loop2: p41 start 10 is beyond EOD, truncated [ 374.833377][T20094] loop2: p42 start 10 is beyond EOD, truncated [ 374.839601][T20094] loop2: p43 start 10 is beyond EOD, truncated [ 374.845767][T20094] loop2: p44 start 10 is beyond EOD, truncated [ 374.851923][T20094] loop2: p45 start 10 is beyond EOD, truncated [ 374.858157][T20094] loop2: p46 start 10 is beyond EOD, truncated [ 374.864354][T20094] loop2: p47 start 10 is beyond EOD, truncated [ 374.870568][T20094] loop2: p48 start 10 is beyond EOD, truncated [ 374.876779][T20094] loop2: p49 start 10 is beyond EOD, truncated [ 374.883439][T20094] loop2: p50 start 10 is beyond EOD, truncated [ 374.889705][T20094] loop2: p51 start 10 is beyond EOD, truncated [ 374.896005][T20094] loop2: p52 start 10 is beyond EOD, truncated [ 374.902153][T20094] loop2: p53 start 10 is beyond EOD, truncated [ 374.908343][T20094] loop2: p54 start 10 is beyond EOD, truncated [ 374.914486][T20094] loop2: p55 start 10 is beyond EOD, truncated [ 374.920649][T20094] loop2: p56 start 10 is beyond EOD, truncated [ 374.926817][T20094] loop2: p57 start 10 is beyond EOD, truncated [ 374.933053][T20094] loop2: p58 start 10 is beyond EOD, truncated [ 374.939229][T20094] loop2: p59 start 10 is beyond EOD, truncated [ 374.945415][T20094] loop2: p60 start 10 is beyond EOD, truncated [ 374.951599][T20094] loop2: p61 start 10 is beyond EOD, truncated [ 374.957783][T20094] loop2: p62 start 10 is beyond EOD, truncated [ 374.963944][T20094] loop2: p63 start 10 is beyond EOD, truncated [ 374.970123][T20094] loop2: p64 start 10 is beyond EOD, truncated [ 374.976514][T20094] loop2: p65 start 10 is beyond EOD, truncated [ 374.982681][T20094] loop2: p66 start 10 is beyond EOD, truncated [ 374.988912][T20094] loop2: p67 start 10 is beyond EOD, truncated [ 374.995079][T20094] loop2: p68 start 10 is beyond EOD, truncated [ 375.001224][T20094] loop2: p69 start 10 is beyond EOD, truncated [ 375.007443][T20094] loop2: p70 start 10 is beyond EOD, truncated [ 375.013594][T20094] loop2: p71 start 10 is beyond EOD, truncated [ 375.019782][T20094] loop2: p72 start 10 is beyond EOD, truncated [ 375.026102][T20094] loop2: p73 start 10 is beyond EOD, truncated [ 375.032251][T20094] loop2: p74 start 10 is beyond EOD, truncated [ 375.038427][T20094] loop2: p75 start 10 is beyond EOD, truncated [ 375.044572][T20094] loop2: p76 start 10 is beyond EOD, truncated [ 375.050731][T20094] loop2: p77 start 10 is beyond EOD, truncated [ 375.056888][T20094] loop2: p78 start 10 is beyond EOD, truncated [ 375.063034][T20094] loop2: p79 start 10 is beyond EOD, truncated [ 375.069205][T20094] loop2: p80 start 10 is beyond EOD, truncated [ 375.075372][T20094] loop2: p81 start 10 is beyond EOD, truncated [ 375.081517][T20094] loop2: p82 start 10 is beyond EOD, truncated [ 375.087717][T20094] loop2: p83 start 10 is beyond EOD, truncated [ 375.093935][T20094] loop2: p84 start 10 is beyond EOD, truncated [ 375.100127][T20094] loop2: p85 start 10 is beyond EOD, truncated [ 375.106294][T20094] loop2: p86 start 10 is beyond EOD, truncated [ 375.112447][T20094] loop2: p87 start 10 is beyond EOD, truncated [ 375.118600][T20094] loop2: p88 start 10 is beyond EOD, truncated [ 375.124775][T20094] loop2: p89 start 10 is beyond EOD, truncated [ 375.131682][T20094] loop2: p90 start 10 is beyond EOD, truncated [ 375.137859][T20094] loop2: p91 start 10 is beyond EOD, truncated [ 375.144026][T20094] loop2: p92 start 10 is beyond EOD, truncated [ 375.150237][T20094] loop2: p93 start 10 is beyond EOD, truncated [ 375.156430][T20094] loop2: p94 start 10 is beyond EOD, truncated [ 375.162594][T20094] loop2: p95 start 10 is beyond EOD, truncated [ 375.168837][T20094] loop2: p96 start 10 is beyond EOD, truncated [ 375.174994][T20094] loop2: p97 start 10 is beyond EOD, truncated [ 375.182090][T20094] loop2: p98 start 10 is beyond EOD, truncated [ 375.188250][T20094] loop2: p99 start 10 is beyond EOD, truncated [ 375.194393][T20094] loop2: p100 start 10 is beyond EOD, truncated [ 375.200845][T20094] loop2: p101 start 10 is beyond EOD, truncated [ 375.207101][T20094] loop2: p102 start 10 is beyond EOD, truncated [ 375.213402][T20094] loop2: p103 start 10 is beyond EOD, truncated [ 375.219638][T20094] loop2: p104 start 10 is beyond EOD, truncated [ 375.225888][T20094] loop2: p105 start 10 is beyond EOD, truncated [ 375.232134][T20094] loop2: p106 start 10 is beyond EOD, truncated [ 375.238395][T20094] loop2: p107 start 10 is beyond EOD, truncated [ 375.244653][T20094] loop2: p108 start 10 is beyond EOD, truncated [ 375.250980][T20094] loop2: p109 start 10 is beyond EOD, truncated [ 375.257264][T20094] loop2: p110 start 10 is beyond EOD, truncated [ 375.263496][T20094] loop2: p111 start 10 is beyond EOD, truncated [ 375.269767][T20094] loop2: p112 start 10 is beyond EOD, truncated [ 375.276012][T20094] loop2: p113 start 10 is beyond EOD, truncated [ 375.282249][T20094] loop2: p114 start 10 is beyond EOD, truncated [ 375.288513][T20094] loop2: p115 start 10 is beyond EOD, truncated [ 375.294844][T20094] loop2: p116 start 10 is beyond EOD, truncated [ 375.301085][T20094] loop2: p117 start 10 is beyond EOD, truncated [ 375.307336][T20094] loop2: p118 start 10 is beyond EOD, truncated [ 375.313598][T20094] loop2: p119 start 10 is beyond EOD, truncated [ 375.319860][T20094] loop2: p120 start 10 is beyond EOD, truncated [ 375.326114][T20094] loop2: p121 start 10 is beyond EOD, truncated [ 375.332352][T20094] loop2: p122 start 10 is beyond EOD, truncated [ 375.338714][T20094] loop2: p123 start 10 is beyond EOD, truncated [ 375.345024][T20094] loop2: p124 start 10 is beyond EOD, truncated [ 375.351261][T20094] loop2: p125 start 10 is beyond EOD, truncated [ 375.357513][T20094] loop2: p126 start 10 is beyond EOD, truncated [ 375.363766][T20094] loop2: p127 start 10 is beyond EOD, truncated [ 375.370020][T20094] loop2: p128 start 10 is beyond EOD, truncated [ 375.376280][T20094] loop2: p129 start 10 is beyond EOD, truncated [ 375.382509][T20094] loop2: p130 start 10 is beyond EOD, truncated [ 375.388781][T20094] loop2: p131 start 10 is beyond EOD, truncated [ 375.395031][T20094] loop2: p132 start 10 is beyond EOD, truncated [ 375.401282][T20094] loop2: p133 start 10 is beyond EOD, truncated [ 375.407547][T20094] loop2: p134 start 10 is beyond EOD, truncated [ 375.413872][T20094] loop2: p135 start 10 is beyond EOD, truncated [ 375.420138][T20094] loop2: p136 start 10 is beyond EOD, truncated [ 375.426501][T20094] loop2: p137 start 10 is beyond EOD, truncated [ 375.432770][T20094] loop2: p138 start 10 is beyond EOD, truncated [ 375.439047][T20094] loop2: p139 start 10 is beyond EOD, truncated [ 375.445821][T20094] loop2: p140 start 10 is beyond EOD, truncated [ 375.452172][T20094] loop2: p141 start 10 is beyond EOD, truncated [ 375.459044][T20094] loop2: p142 start 10 is beyond EOD, truncated [ 375.465304][T20094] loop2: p143 start 10 is beyond EOD, truncated [ 375.471551][T20094] loop2: p144 start 10 is beyond EOD, truncated [ 375.477797][T20094] loop2: p145 start 10 is beyond EOD, truncated [ 375.484029][T20094] loop2: p146 start 10 is beyond EOD, truncated [ 375.484730][ T25] kauditd_printk_skb: 68238 callbacks suppressed [ 375.484739][ T25] audit: type=1326 audit(1619743109.767:2317861): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 375.490288][T20094] loop2: p147 start 10 is beyond EOD, [ 375.503372][ T25] audit: type=1326 audit(1619743109.787:2317862): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 375.520911][T20094] truncated [ 375.520920][T20094] loop2: p148 start 10 is beyond EOD, [ 375.527427][ T25] audit: type=1326 audit(1619743109.787:2317863): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 375.550685][T20094] truncated [ 375.550692][T20094] loop2: p149 start 10 is beyond EOD, truncated [ 375.550711][T20094] loop2: p150 start 10 is beyond EOD, [ 375.554850][ T25] audit: type=1326 audit(1619743109.787:2317864): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 375.559384][T20094] truncated [ 375.584586][ T25] audit: type=1326 audit(1619743109.787:2317865): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 375.586826][T20094] loop2: p151 start 10 is beyond EOD, [ 375.593500][ T25] audit: type=1326 audit(1619743109.787:2317866): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 375.598508][T20094] truncated [ 375.598513][T20094] loop2: p152 start 10 is beyond EOD, [ 375.624133][ T25] audit: type=1326 audit(1619743109.787:2317867): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 375.626017][T20094] truncated [ 375.651445][ T25] audit: type=1326 audit(1619743109.787:2317868): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 375.655822][T20094] loop2: p153 start 10 is beyond EOD, truncated [ 375.680759][ T25] audit: type=1326 audit(1619743109.787:2317869): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 375.683228][T20094] loop2: p154 start 10 is beyond EOD, truncated [ 375.683243][T20094] loop2: p155 start 10 is beyond EOD, [ 375.689305][ T25] audit: type=1326 audit(1619743109.787:2317870): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 375.713373][T20094] truncated [ 375.713379][T20094] loop2: p156 start 10 is beyond EOD, truncated [ 375.817564][T20094] loop2: p157 start 10 is beyond EOD, truncated [ 375.823794][T20094] loop2: p158 start 10 is beyond EOD, truncated [ 375.830048][T20094] loop2: p159 start 10 is beyond EOD, truncated [ 375.836305][T20094] loop2: p160 start 10 is beyond EOD, truncated [ 375.842584][T20094] loop2: p161 start 10 is beyond EOD, truncated [ 375.848878][T20094] loop2: p162 start 10 is beyond EOD, truncated [ 375.855208][T20094] loop2: p163 start 10 is beyond EOD, truncated [ 375.861452][T20094] loop2: p164 start 10 is beyond EOD, truncated [ 375.867717][T20094] loop2: p165 start 10 is beyond EOD, truncated [ 375.873943][T20094] loop2: p166 start 10 is beyond EOD, truncated [ 375.880180][T20094] loop2: p167 start 10 is beyond EOD, truncated [ 375.886432][T20094] loop2: p168 start 10 is beyond EOD, truncated [ 375.892663][T20094] loop2: p169 start 10 is beyond EOD, truncated [ 375.898968][T20094] loop2: p170 start 10 is beyond EOD, truncated [ 375.905249][T20094] loop2: p171 start 10 is beyond EOD, truncated [ 375.911509][T20094] loop2: p172 start 10 is beyond EOD, truncated [ 375.917750][T20094] loop2: p173 start 10 is beyond EOD, truncated [ 375.924035][T20094] loop2: p174 start 10 is beyond EOD, truncated [ 375.930439][T20094] loop2: p175 start 10 is beyond EOD, truncated [ 375.936894][T20094] loop2: p176 start 10 is beyond EOD, truncated [ 375.943184][T20094] loop2: p177 start 10 is beyond EOD, truncated [ 375.949436][T20094] loop2: p178 start 10 is beyond EOD, truncated [ 375.955857][T20094] loop2: p179 start 10 is beyond EOD, truncated [ 375.962084][T20094] loop2: p180 start 10 is beyond EOD, truncated [ 375.968379][T20094] loop2: p181 start 10 is beyond EOD, truncated [ 375.974687][T20094] loop2: p182 start 10 is beyond EOD, truncated [ 375.981013][T20094] loop2: p183 start 10 is beyond EOD, truncated [ 375.987250][T20094] loop2: p184 start 10 is beyond EOD, truncated [ 375.993476][T20094] loop2: p185 start 10 is beyond EOD, truncated [ 375.999785][T20094] loop2: p186 start 10 is beyond EOD, truncated [ 376.006096][T20094] loop2: p187 start 10 is beyond EOD, truncated [ 376.012333][T20094] loop2: p188 start 10 is beyond EOD, truncated [ 376.018586][T20094] loop2: p189 start 10 is beyond EOD, truncated [ 376.024842][T20094] loop2: p190 start 10 is beyond EOD, truncated [ 376.031090][T20094] loop2: p191 start 10 is beyond EOD, truncated [ 376.037374][T20094] loop2: p192 start 10 is beyond EOD, truncated [ 376.043619][T20094] loop2: p193 start 10 is beyond EOD, truncated [ 376.050181][T20094] loop2: p194 start 10 is beyond EOD, truncated [ 376.056483][T20094] loop2: p195 start 10 is beyond EOD, truncated [ 376.062719][T20094] loop2: p196 start 10 is beyond EOD, truncated [ 376.069228][T20094] loop2: p197 start 10 is beyond EOD, truncated [ 376.075484][T20094] loop2: p198 start 10 is beyond EOD, truncated [ 376.081721][T20094] loop2: p199 start 10 is beyond EOD, truncated [ 376.087987][T20094] loop2: p200 start 10 is beyond EOD, truncated [ 376.094223][T20094] loop2: p201 start 10 is beyond EOD, truncated [ 376.100504][T20094] loop2: p202 start 10 is beyond EOD, truncated [ 376.106766][T20094] loop2: p203 start 10 is beyond EOD, truncated [ 376.113017][T20094] loop2: p204 start 10 is beyond EOD, truncated [ 376.119279][T20094] loop2: p205 start 10 is beyond EOD, truncated [ 376.125529][T20094] loop2: p206 start 10 is beyond EOD, truncated [ 376.131761][T20094] loop2: p207 start 10 is beyond EOD, truncated [ 376.138125][T20094] loop2: p208 start 10 is beyond EOD, truncated [ 376.144497][T20094] loop2: p209 start 10 is beyond EOD, truncated [ 376.150764][T20094] loop2: p210 start 10 is beyond EOD, truncated [ 376.157323][T20094] loop2: p211 start 10 is beyond EOD, truncated [ 376.163611][T20094] loop2: p212 start 10 is beyond EOD, truncated [ 376.169866][T20094] loop2: p213 start 10 is beyond EOD, truncated [ 376.176137][T20094] loop2: p214 start 10 is beyond EOD, truncated [ 376.182389][T20094] loop2: p215 start 10 is beyond EOD, truncated [ 376.188635][T20094] loop2: p216 start 10 is beyond EOD, truncated [ 376.194881][T20094] loop2: p217 start 10 is beyond EOD, truncated [ 376.201721][T20094] loop2: p218 start 10 is beyond EOD, truncated [ 376.207966][T20094] loop2: p219 start 10 is beyond EOD, truncated [ 376.214252][T20094] loop2: p220 start 10 is beyond EOD, truncated [ 376.220520][T20094] loop2: p221 start 10 is beyond EOD, truncated [ 376.226776][T20094] loop2: p222 start 10 is beyond EOD, truncated [ 376.233014][T20094] loop2: p223 start 10 is beyond EOD, truncated [ 376.239260][T20094] loop2: p224 start 10 is beyond EOD, truncated [ 376.245531][T20094] loop2: p225 start 10 is beyond EOD, truncated [ 376.251766][T20094] loop2: p226 start 10 is beyond EOD, truncated [ 376.258028][T20094] loop2: p227 start 10 is beyond EOD, truncated [ 376.264314][T20094] loop2: p228 start 10 is beyond EOD, truncated [ 376.270721][T20094] loop2: p229 start 10 is beyond EOD, truncated [ 376.276973][T20094] loop2: p230 start 10 is beyond EOD, truncated [ 376.283198][T20094] loop2: p231 start 10 is beyond EOD, truncated [ 376.289452][T20094] loop2: p232 start 10 is beyond EOD, truncated [ 376.295704][T20094] loop2: p233 start 10 is beyond EOD, truncated [ 376.301942][T20094] loop2: p234 start 10 is beyond EOD, truncated [ 376.308185][T20094] loop2: p235 start 10 is beyond EOD, truncated [ 376.314505][T20094] loop2: p236 start 10 is beyond EOD, truncated [ 376.320771][T20094] loop2: p237 start 10 is beyond EOD, truncated [ 376.327034][T20094] loop2: p238 start 10 is beyond EOD, truncated [ 376.333268][T20094] loop2: p239 start 10 is beyond EOD, truncated [ 376.339564][T20094] loop2: p240 start 10 is beyond EOD, truncated [ 376.345944][T20094] loop2: p241 start 10 is beyond EOD, truncated [ 376.352170][T20094] loop2: p242 start 10 is beyond EOD, truncated [ 376.358424][T20094] loop2: p243 start 10 is beyond EOD, truncated [ 376.364674][T20094] loop2: p244 start 10 is beyond EOD, truncated [ 376.370963][T20094] loop2: p245 start 10 is beyond EOD, truncated [ 376.377228][T20094] loop2: p246 start 10 is beyond EOD, truncated [ 376.383672][T20094] loop2: p247 start 10 is beyond EOD, truncated [ 376.389945][T20094] loop2: p248 start 10 is beyond EOD, truncated [ 376.396208][T20094] loop2: p249 start 10 is beyond EOD, truncated [ 376.402478][T20094] loop2: p250 start 10 is beyond EOD, truncated [ 376.408757][T20094] loop2: p251 start 10 is beyond EOD, truncated [ 376.415037][T20094] loop2: p252 start 10 is beyond EOD, truncated [ 376.421267][T20094] loop2: p253 start 10 is beyond EOD, truncated [ 376.427673][T20094] loop2: p254 start 10 is beyond EOD, truncated [ 376.433907][T20094] loop2: p255 start 10 is beyond EOD, truncated 00:38:30 executing program 2: syz_read_part_table(0x0, 0x1, &(0x7f0000000040)=[{&(0x7f00000000c0)="0201a5ffffff0a000000ff45ac000000000005000800000000000000024000ffffff82000000e1000000887700720030070082ffffff00000000008000da55aa", 0x40, 0x1c0}]) 00:38:30 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_type(r1, &(0x7f0000000140), 0xffffff1f) perf_event_open(&(0x7f000001d000)={0x1, 0x70}, 0x0, 0x0, r0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0x28000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) 00:38:30 executing program 4: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffff}) pwrite64(r3, &(0x7f0000000200)="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", 0x200, 0x0) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) 00:38:30 executing program 5: syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) sendmsg$TEAM_CMD_OPTIONS_GET(r0, 0x0, 0x0) 00:38:30 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_type(r1, &(0x7f0000000140), 0xffffff1f) perf_event_open(&(0x7f000001d000)={0x1, 0x70}, 0x0, 0x0, r0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0x28000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) 00:38:30 executing program 0: r0 = creat(&(0x7f0000000400)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000100)='./bus\x00', 0x0) io_setup(0x202, &(0x7f0000000200)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x1a000000}]) io_submit(r2, 0x1, &(0x7f0000000100)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, r0, 0x0, 0x2}]) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) dup3(r3, r0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 00:38:30 executing program 5: syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) sendmsg$TEAM_CMD_OPTIONS_GET(r0, 0x0, 0x0) [ 376.653464][ T1029] loop2: p1 p2 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p2 [ 376.653720][ T1029] loop2: p1 start 10 is beyond EOD, truncated 00:38:31 executing program 5: syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) sendmsg$TEAM_CMD_OPTIONS_GET(r0, 0x0, 0x0) [ 376.750201][ T1029] loop2: p2 size 2 extends beyond EOD, truncated 00:38:31 executing program 5: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f00000001c0)={0x1, &(0x7f0000000180)=[{0x6}]}) socket$nl_generic(0x10, 0x3, 0x10) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x541b, 0x0) 00:38:31 executing program 0: pipe2(&(0x7f0000001c80)={0xffffffffffffffff}, 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x1, 0x0, 0x0, 0x0) [ 376.988880][ T1029] loop2: p3 start 225 is beyond EOD, truncated [ 376.995118][ T1029] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 377.011694][ T1029] loop2: p5 start 10 is beyond EOD, truncated [ 377.017916][ T1029] loop2: p6 start 10 is beyond EOD, truncated [ 377.024021][ T1029] loop2: p7 start 10 is beyond EOD, truncated [ 377.032022][ T1029] loop2: p8 start 10 is beyond EOD, truncated [ 377.038279][ T1029] loop2: p9 start 10 is beyond EOD, truncated [ 377.044354][ T1029] loop2: p10 start 10 is beyond EOD, truncated [ 377.050622][ T1029] loop2: p11 start 10 is beyond EOD, truncated [ 377.056835][ T1029] loop2: p12 start 10 is beyond EOD, truncated [ 377.063053][ T1029] loop2: p13 start 10 is beyond EOD, truncated [ 377.069273][ T1029] loop2: p14 start 10 is beyond EOD, truncated [ 377.075494][ T1029] loop2: p15 start 10 is beyond EOD, truncated [ 377.081733][ T1029] loop2: p16 start 10 is beyond EOD, truncated [ 377.087993][ T1029] loop2: p17 start 10 is beyond EOD, truncated [ 377.094138][ T1029] loop2: p18 start 10 is beyond EOD, truncated [ 377.100378][ T1029] loop2: p19 start 10 is beyond EOD, truncated [ 377.106544][ T1029] loop2: p20 start 10 is beyond EOD, truncated [ 377.112686][ T1029] loop2: p21 start 10 is beyond EOD, truncated [ 377.118869][ T1029] loop2: p22 start 10 is beyond EOD, truncated [ 377.125038][ T1029] loop2: p23 start 10 is beyond EOD, truncated [ 377.131199][ T1029] loop2: p24 start 10 is beyond EOD, truncated [ 377.137373][ T1029] loop2: p25 start 10 is beyond EOD, truncated [ 377.143519][ T1029] loop2: p26 start 10 is beyond EOD, truncated [ 377.149703][ T1029] loop2: p27 start 10 is beyond EOD, truncated [ 377.155933][ T1029] loop2: p28 start 10 is beyond EOD, truncated [ 377.162088][ T1029] loop2: p29 start 10 is beyond EOD, truncated [ 377.168258][ T1029] loop2: p30 start 10 is beyond EOD, truncated [ 377.174405][ T1029] loop2: p31 start 10 is beyond EOD, truncated [ 377.180578][ T1029] loop2: p32 start 10 is beyond EOD, truncated 00:38:31 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_type(r1, &(0x7f0000000140), 0xffffff1f) perf_event_open(&(0x7f000001d000)={0x1, 0x70}, 0x0, 0x0, r0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0x28000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) [ 377.186753][ T1029] loop2: p33 start 10 is beyond EOD, truncated [ 377.192899][ T1029] loop2: p34 start 10 is beyond EOD, truncated [ 377.199074][ T1029] loop2: p35 start 10 is beyond EOD, truncated [ 377.205237][ T1029] loop2: p36 start 10 is beyond EOD, truncated [ 377.211395][ T1029] loop2: p37 start 10 is beyond EOD, truncated [ 377.218787][ T1029] loop2: p38 start 10 is beyond EOD, truncated [ 377.225032][ T1029] loop2: p39 start 10 is beyond EOD, truncated [ 377.231265][ T1029] loop2: p40 start 10 is beyond EOD, truncated 00:38:31 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_type(r1, &(0x7f0000000140), 0xffffff1f) perf_event_open(&(0x7f000001d000)={0x1, 0x70}, 0x0, 0x0, r0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0x28000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) [ 377.237430][ T1029] loop2: p41 start 10 is beyond EOD, truncated [ 377.243705][ T1029] loop2: p42 start 10 is beyond EOD, truncated [ 377.249953][ T1029] loop2: p43 start 10 is beyond EOD, truncated [ 377.256124][ T1029] loop2: p44 start 10 is beyond EOD, truncated [ 377.262273][ T1029] loop2: p45 start 10 is beyond EOD, truncated [ 377.274007][ T1029] loop2: p46 start 10 is beyond EOD, truncated [ 377.280183][ T1029] loop2: p47 start 10 is beyond EOD, truncated [ 377.286448][ T1029] loop2: p48 start 10 is beyond EOD, truncated [ 377.292673][ T1029] loop2: p49 start 10 is beyond EOD, truncated [ 377.298878][ T1029] loop2: p50 start 10 is beyond EOD, truncated [ 377.305064][ T1029] loop2: p51 start 10 is beyond EOD, truncated [ 377.311226][ T1029] loop2: p52 start 10 is beyond EOD, truncated [ 377.317620][ T1029] loop2: p53 start 10 is beyond EOD, truncated [ 377.324076][ T1029] loop2: p54 start 10 is beyond EOD, truncated [ 377.331002][ T1029] loop2: p55 start 10 is beyond EOD, truncated [ 377.337217][ T1029] loop2: p56 start 10 is beyond EOD, truncated [ 377.343431][ T1029] loop2: p57 start 10 is beyond EOD, truncated [ 377.349663][ T1029] loop2: p58 start 10 is beyond EOD, truncated [ 377.355830][ T1029] loop2: p59 start 10 is beyond EOD, truncated [ 377.361990][ T1029] loop2: p60 start 10 is beyond EOD, truncated [ 377.368147][ T1029] loop2: p61 start 10 is beyond EOD, truncated [ 377.374381][ T1029] loop2: p62 start 10 is beyond EOD, truncated [ 377.380913][ T1029] loop2: p63 start 10 is beyond EOD, truncated [ 377.388154][ T1029] loop2: p64 start 10 is beyond EOD, truncated [ 377.394405][ T1029] loop2: p65 start 10 is beyond EOD, truncated [ 377.401156][ T1029] loop2: p66 start 10 is beyond EOD, truncated [ 377.407414][ T1029] loop2: p67 start 10 is beyond EOD, truncated [ 377.413708][ T1029] loop2: p68 start 10 is beyond EOD, truncated [ 377.419931][ T1029] loop2: p69 start 10 is beyond EOD, truncated [ 377.426179][ T1029] loop2: p70 start 10 is beyond EOD, truncated [ 377.432681][ T1029] loop2: p71 start 10 is beyond EOD, truncated [ 377.438866][ T1029] loop2: p72 start 10 is beyond EOD, truncated [ 377.445045][ T1029] loop2: p73 start 10 is beyond EOD, truncated [ 377.451200][ T1029] loop2: p74 start 10 is beyond EOD, truncated [ 377.457370][ T1029] loop2: p75 start 10 is beyond EOD, truncated [ 377.463630][ T1029] loop2: p76 start 10 is beyond EOD, truncated [ 377.469793][ T1029] loop2: p77 start 10 is beyond EOD, truncated [ 377.476043][ T1029] loop2: p78 start 10 is beyond EOD, truncated [ 377.482180][ T1029] loop2: p79 start 10 is beyond EOD, truncated [ 377.488350][ T1029] loop2: p80 start 10 is beyond EOD, truncated [ 377.494551][ T1029] loop2: p81 start 10 is beyond EOD, truncated [ 377.500820][ T1029] loop2: p82 start 10 is beyond EOD, truncated [ 377.506986][ T1029] loop2: p83 start 10 is beyond EOD, truncated [ 377.513125][ T1029] loop2: p84 start 10 is beyond EOD, truncated [ 377.519457][ T1029] loop2: p85 start 10 is beyond EOD, truncated [ 377.525619][ T1029] loop2: p86 start 10 is beyond EOD, truncated [ 377.531766][ T1029] loop2: p87 start 10 is beyond EOD, truncated [ 377.537934][ T1029] loop2: p88 start 10 is beyond EOD, truncated [ 377.545036][ T1029] loop2: p89 start 10 is beyond EOD, truncated [ 377.551176][ T1029] loop2: p90 start 10 is beyond EOD, truncated [ 377.557380][ T1029] loop2: p91 start 10 is beyond EOD, truncated [ 377.563531][ T1029] loop2: p92 start 10 is beyond EOD, truncated [ 377.569713][ T1029] loop2: p93 start 10 is beyond EOD, truncated [ 377.575873][ T1029] loop2: p94 start 10 is beyond EOD, truncated [ 377.582038][ T1029] loop2: p95 start 10 is beyond EOD, truncated [ 377.588374][ T1029] loop2: p96 start 10 is beyond EOD, truncated [ 377.595319][ T1029] loop2: p97 start 10 is beyond EOD, truncated [ 377.601456][ T1029] loop2: p98 start 10 is beyond EOD, truncated [ 377.607620][ T1029] loop2: p99 start 10 is beyond EOD, truncated [ 377.613767][ T1029] loop2: p100 start 10 is beyond EOD, truncated [ 377.620020][ T1029] loop2: p101 start 10 is beyond EOD, truncated [ 377.626261][ T1029] loop2: p102 start 10 is beyond EOD, truncated [ 377.632571][ T1029] loop2: p103 start 10 is beyond EOD, truncated [ 377.638820][ T1029] loop2: p104 start 10 is beyond EOD, truncated [ 377.645141][ T1029] loop2: p105 start 10 is beyond EOD, truncated [ 377.651371][ T1029] loop2: p106 start 10 is beyond EOD, truncated [ 377.657608][ T1029] loop2: p107 start 10 is beyond EOD, truncated [ 377.663960][ T1029] loop2: p108 start 10 is beyond EOD, truncated [ 377.670296][ T1029] loop2: p109 start 10 is beyond EOD, truncated [ 377.676551][ T1029] loop2: p110 start 10 is beyond EOD, truncated [ 377.682787][ T1029] loop2: p111 start 10 is beyond EOD, truncated [ 377.689180][ T1029] loop2: p112 start 10 is beyond EOD, truncated [ 377.695545][ T1029] loop2: p113 start 10 is beyond EOD, truncated [ 377.701867][ T1029] loop2: p114 start 10 is beyond EOD, truncated [ 377.708133][ T1029] loop2: p115 start 10 is beyond EOD, truncated [ 377.714575][ T1029] loop2: p116 start 10 is beyond EOD, truncated [ 377.720811][ T1029] loop2: p117 start 10 is beyond EOD, truncated [ 377.727070][ T1029] loop2: p118 start 10 is beyond EOD, truncated [ 377.733384][ T1029] loop2: p119 start 10 is beyond EOD, truncated [ 377.739633][ T1029] loop2: p120 start 10 is beyond EOD, truncated [ 377.745921][ T1029] loop2: p121 start 10 is beyond EOD, truncated [ 377.753096][ T1029] loop2: p122 start 10 is beyond EOD, truncated [ 377.759442][ T1029] loop2: p123 start 10 is beyond EOD, truncated [ 377.765820][ T1029] loop2: p124 start 10 is beyond EOD, truncated [ 377.772104][ T1029] loop2: p125 start 10 is beyond EOD, truncated [ 377.779170][ T1029] loop2: p126 start 10 is beyond EOD, truncated [ 377.786334][ T1029] loop2: p127 start 10 is beyond EOD, truncated [ 377.794235][ T1029] loop2: p128 start 10 is beyond EOD, truncated [ 377.800525][ T1029] loop2: p129 start 10 is beyond EOD, truncated [ 377.807206][ T1029] loop2: p130 start 10 is beyond EOD, truncated [ 377.813434][ T1029] loop2: p131 start 10 is beyond EOD, truncated [ 377.819693][ T1029] loop2: p132 start 10 is beyond EOD, truncated [ 377.825952][ T1029] loop2: p133 start 10 is beyond EOD, truncated [ 377.832301][ T1029] loop2: p134 start 10 is beyond EOD, truncated [ 377.838648][ T1029] loop2: p135 start 10 is beyond EOD, truncated [ 377.845004][ T1029] loop2: p136 start 10 is beyond EOD, truncated [ 377.851246][ T1029] loop2: p137 start 10 is beyond EOD, truncated [ 377.857601][ T1029] loop2: p138 start 10 is beyond EOD, truncated [ 377.863834][ T1029] loop2: p139 start 10 is beyond EOD, truncated [ 377.870101][ T1029] loop2: p140 start 10 is beyond EOD, truncated [ 377.876354][ T1029] loop2: p141 start 10 is beyond EOD, truncated [ 377.882590][ T1029] loop2: p142 start 10 is beyond EOD, truncated [ 377.888863][ T1029] loop2: p143 start 10 is beyond EOD, truncated [ 377.895634][ T1029] loop2: p144 start 10 is beyond EOD, truncated [ 377.901863][ T1029] loop2: p145 start 10 is beyond EOD, truncated [ 377.908120][ T1029] loop2: p146 start 10 is beyond EOD, truncated [ 377.914542][ T1029] loop2: p147 start 10 is beyond EOD, truncated [ 377.920862][ T1029] loop2: p148 start 10 is beyond EOD, truncated [ 377.928517][ T1029] loop2: p149 start 10 is beyond EOD, truncated [ 377.935007][ T1029] loop2: p150 start 10 is beyond EOD, truncated [ 377.941240][ T1029] loop2: p151 start 10 is beyond EOD, truncated [ 377.947605][ T1029] loop2: p152 start 10 is beyond EOD, truncated [ 377.953917][ T1029] loop2: p153 start 10 is beyond EOD, truncated [ 377.960281][ T1029] loop2: p154 start 10 is beyond EOD, truncated [ 377.966598][ T1029] loop2: p155 start 10 is beyond EOD, truncated [ 377.972829][ T1029] loop2: p156 start 10 is beyond EOD, truncated [ 377.979133][ T1029] loop2: p157 start 10 is beyond EOD, truncated [ 377.985388][ T1029] loop2: p158 start 10 is beyond EOD, truncated [ 377.991656][ T1029] loop2: p159 start 10 is beyond EOD, truncated [ 377.997917][ T1029] loop2: p160 start 10 is beyond EOD, truncated [ 378.004211][ T1029] loop2: p161 start 10 is beyond EOD, truncated [ 378.010509][ T1029] loop2: p162 start 10 is beyond EOD, truncated [ 378.016770][ T1029] loop2: p163 start 10 is beyond EOD, truncated [ 378.023005][ T1029] loop2: p164 start 10 is beyond EOD, truncated [ 378.029300][ T1029] loop2: p165 start 10 is beyond EOD, truncated [ 378.035552][ T1029] loop2: p166 start 10 is beyond EOD, truncated [ 378.041790][ T1029] loop2: p167 start 10 is beyond EOD, truncated [ 378.048041][ T1029] loop2: p168 start 10 is beyond EOD, truncated [ 378.054271][ T1029] loop2: p169 start 10 is beyond EOD, truncated [ 378.060543][ T1029] loop2: p170 start 10 is beyond EOD, truncated [ 378.066891][ T1029] loop2: p171 start 10 is beyond EOD, truncated [ 378.073181][ T1029] loop2: p172 start 10 is beyond EOD, truncated [ 378.079443][ T1029] loop2: p173 start 10 is beyond EOD, truncated [ 378.085708][ T1029] loop2: p174 start 10 is beyond EOD, truncated [ 378.091966][ T1029] loop2: p175 start 10 is beyond EOD, truncated [ 378.098223][ T1029] loop2: p176 start 10 is beyond EOD, truncated [ 378.104473][ T1029] loop2: p177 start 10 is beyond EOD, truncated [ 378.110801][ T1029] loop2: p178 start 10 is beyond EOD, truncated [ 378.117064][ T1029] loop2: p179 start 10 is beyond EOD, truncated [ 378.123409][ T1029] loop2: p180 start 10 is beyond EOD, truncated [ 378.129742][ T1029] loop2: p181 start 10 is beyond EOD, truncated [ 378.136013][ T1029] loop2: p182 start 10 is beyond EOD, truncated [ 378.142256][ T1029] loop2: p183 start 10 is beyond EOD, truncated [ 378.148528][ T1029] loop2: p184 start 10 is beyond EOD, truncated [ 378.154782][ T1029] loop2: p185 start 10 is beyond EOD, truncated [ 378.161011][ T1029] loop2: p186 start 10 is beyond EOD, truncated [ 378.167276][ T1029] loop2: p187 start 10 is beyond EOD, truncated [ 378.173506][ T1029] loop2: p188 start 10 is beyond EOD, truncated [ 378.180188][ T1029] loop2: p189 start 10 is beyond EOD, truncated [ 378.186437][ T1029] loop2: p190 start 10 is beyond EOD, truncated [ 378.192669][ T1029] loop2: p191 start 10 is beyond EOD, truncated [ 378.198995][ T1029] loop2: p192 start 10 is beyond EOD, truncated [ 378.205286][ T1029] loop2: p193 start 10 is beyond EOD, truncated [ 378.211538][ T1029] loop2: p194 start 10 is beyond EOD, truncated [ 378.217796][ T1029] loop2: p195 start 10 is beyond EOD, truncated [ 378.224223][ T1029] loop2: p196 start 10 is beyond EOD, truncated [ 378.230510][ T1029] loop2: p197 start 10 is beyond EOD, truncated [ 378.236761][ T1029] loop2: p198 start 10 is beyond EOD, truncated [ 378.243108][ T1029] loop2: p199 start 10 is beyond EOD, truncated [ 378.249372][ T1029] loop2: p200 start 10 is beyond EOD, truncated [ 378.262836][ T1029] loop2: p201 start 10 is beyond EOD, truncated [ 378.269123][ T1029] loop2: p202 start 10 is beyond EOD, truncated [ 378.275380][ T1029] loop2: p203 start 10 is beyond EOD, truncated [ 378.281611][ T1029] loop2: p204 start 10 is beyond EOD, truncated [ 378.287868][ T1029] loop2: p205 start 10 is beyond EOD, truncated [ 378.294284][ T1029] loop2: p206 start 10 is beyond EOD, truncated [ 378.300536][ T1029] loop2: p207 start 10 is beyond EOD, truncated [ 378.306791][ T1029] loop2: p208 start 10 is beyond EOD, truncated [ 378.313800][ T1029] loop2: p209 start 10 is beyond EOD, truncated [ 378.320112][ T1029] loop2: p210 start 10 is beyond EOD, truncated [ 378.326691][ T1029] loop2: p211 start 10 is beyond EOD, truncated [ 378.333089][ T1029] loop2: p212 start 10 is beyond EOD, truncated [ 378.339403][ T1029] loop2: p213 start 10 is beyond EOD, truncated [ 378.345664][ T1029] loop2: p214 start 10 is beyond EOD, truncated [ 378.351898][ T1029] loop2: p215 start 10 is beyond EOD, truncated [ 378.358174][ T1029] loop2: p216 start 10 is beyond EOD, truncated [ 378.364423][ T1029] loop2: p217 start 10 is beyond EOD, truncated [ 378.370658][ T1029] loop2: p218 start 10 is beyond EOD, truncated [ 378.376915][ T1029] loop2: p219 start 10 is beyond EOD, truncated [ 378.383143][ T1029] loop2: p220 start 10 is beyond EOD, truncated [ 378.389406][ T1029] loop2: p221 start 10 is beyond EOD, truncated [ 378.395664][ T1029] loop2: p222 start 10 is beyond EOD, truncated [ 378.401993][ T1029] loop2: p223 start 10 is beyond EOD, truncated [ 378.408264][ T1029] loop2: p224 start 10 is beyond EOD, truncated [ 378.414530][ T1029] loop2: p225 start 10 is beyond EOD, truncated [ 378.420757][ T1029] loop2: p226 start 10 is beyond EOD, truncated [ 378.427104][ T1029] loop2: p227 start 10 is beyond EOD, truncated [ 378.433331][ T1029] loop2: p228 start 10 is beyond EOD, truncated [ 378.439777][ T1029] loop2: p229 start 10 is beyond EOD, truncated [ 378.446029][ T1029] loop2: p230 start 10 is beyond EOD, truncated [ 378.452291][ T1029] loop2: p231 start 10 is beyond EOD, truncated [ 378.458545][ T1029] loop2: p232 start 10 is beyond EOD, truncated [ 378.464806][ T1029] loop2: p233 start 10 is beyond EOD, truncated [ 378.471038][ T1029] loop2: p234 start 10 is beyond EOD, truncated [ 378.477284][ T1029] loop2: p235 start 10 is beyond EOD, truncated [ 378.483550][ T1029] loop2: p236 start 10 is beyond EOD, truncated [ 378.489828][ T1029] loop2: p237 start 10 is beyond EOD, truncated [ 378.496093][ T1029] loop2: p238 start 10 is beyond EOD, truncated [ 378.502355][ T1029] loop2: p239 start 10 is beyond EOD, truncated [ 378.508601][ T1029] loop2: p240 start 10 is beyond EOD, truncated [ 378.514845][ T1029] loop2: p241 start 10 is beyond EOD, truncated [ 378.521073][ T1029] loop2: p242 start 10 is beyond EOD, truncated [ 378.527358][ T1029] loop2: p243 start 10 is beyond EOD, truncated [ 378.533585][ T1029] loop2: p244 start 10 is beyond EOD, truncated [ 378.539879][ T1029] loop2: p245 start 10 is beyond EOD, truncated [ 378.546126][ T1029] loop2: p246 start 10 is beyond EOD, truncated [ 378.552378][ T1029] loop2: p247 start 10 is beyond EOD, truncated [ 378.558657][ T1029] loop2: p248 start 10 is beyond EOD, truncated [ 378.564913][ T1029] loop2: p249 start 10 is beyond EOD, truncated [ 378.571143][ T1029] loop2: p250 start 10 is beyond EOD, truncated [ 378.577475][ T1029] loop2: p251 start 10 is beyond EOD, truncated [ 378.583757][ T1029] loop2: p252 start 10 is beyond EOD, truncated [ 378.590277][ T1029] loop2: p253 start 10 is beyond EOD, truncated [ 378.596612][ T1029] loop2: p254 start 10 is beyond EOD, truncated [ 378.602842][ T1029] loop2: p255 start 10 is beyond EOD, truncated [ 378.648893][T20175] loop2: detected capacity change from 0 to 1 [ 378.700196][T20175] loop2: p1 p2 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p2 [ 378.700382][T20175] loop2: p1 start 10 is beyond EOD, truncated [ 378.793469][T20175] loop2: p2 size 2 extends beyond EOD, truncated [ 378.800569][T20175] loop2: p3 start 225 is beyond EOD, truncated [ 378.806837][T20175] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 378.824883][T20175] loop2: p5 start 10 is beyond EOD, truncated [ 378.831151][T20175] loop2: p6 start 10 is beyond EOD, truncated [ 378.837242][T20175] loop2: p7 start 10 is beyond EOD, truncated [ 378.843293][T20175] loop2: p8 start 10 is beyond EOD, truncated [ 378.849356][T20175] loop2: p9 start 10 is beyond EOD, truncated [ 378.855436][T20175] loop2: p10 start 10 is beyond EOD, truncated [ 378.861571][T20175] loop2: p11 start 10 is beyond EOD, truncated [ 378.867776][T20175] loop2: p12 start 10 is beyond EOD, truncated [ 378.873960][T20175] loop2: p13 start 10 is beyond EOD, truncated [ 378.880116][T20175] loop2: p14 start 10 is beyond EOD, truncated [ 378.886616][T20175] loop2: p15 start 10 is beyond EOD, truncated [ 378.894090][T20175] loop2: p16 start 10 is beyond EOD, truncated [ 378.900389][T20175] loop2: p17 start 10 is beyond EOD, truncated [ 378.906551][T20175] loop2: p18 start 10 is beyond EOD, truncated [ 378.912719][T20175] loop2: p19 start 10 is beyond EOD, truncated [ 378.918883][T20175] loop2: p20 start 10 is beyond EOD, truncated [ 378.925047][T20175] loop2: p21 start 10 is beyond EOD, truncated [ 378.931243][T20175] loop2: p22 start 10 is beyond EOD, truncated [ 378.937673][T20175] loop2: p23 start 10 is beyond EOD, truncated [ 378.943906][T20175] loop2: p24 start 10 is beyond EOD, truncated [ 378.951370][T20175] loop2: p25 start 10 is beyond EOD, truncated [ 378.957542][T20175] loop2: p26 start 10 is beyond EOD, truncated [ 378.966821][T20175] loop2: p27 start 10 is beyond EOD, truncated [ 378.972965][T20175] loop2: p28 start 10 is beyond EOD, truncated [ 378.979643][T20175] loop2: p29 start 10 is beyond EOD, truncated [ 378.985830][T20175] loop2: p30 start 10 is beyond EOD, truncated [ 378.991995][T20175] loop2: p31 start 10 is beyond EOD, truncated [ 378.998412][T20175] loop2: p32 start 10 is beyond EOD, truncated [ 379.005418][T20175] loop2: p33 start 10 is beyond EOD, truncated [ 379.011650][T20175] loop2: p34 start 10 is beyond EOD, truncated [ 379.017867][T20175] loop2: p35 start 10 is beyond EOD, truncated [ 379.024051][T20175] loop2: p36 start 10 is beyond EOD, truncated [ 379.030245][T20175] loop2: p37 start 10 is beyond EOD, truncated [ 379.036561][T20175] loop2: p38 start 10 is beyond EOD, truncated [ 379.042798][T20175] loop2: p39 start 10 is beyond EOD, truncated [ 379.048959][T20175] loop2: p40 start 10 is beyond EOD, truncated [ 379.055144][T20175] loop2: p41 start 10 is beyond EOD, truncated [ 379.061287][T20175] loop2: p42 start 10 is beyond EOD, truncated [ 379.068178][T20175] loop2: p43 start 10 is beyond EOD, truncated [ 379.075034][T20175] loop2: p44 start 10 is beyond EOD, truncated [ 379.081903][T20175] loop2: p45 start 10 is beyond EOD, truncated [ 379.088064][T20175] loop2: p46 start 10 is beyond EOD, truncated [ 379.094234][T20175] loop2: p47 start 10 is beyond EOD, truncated [ 379.100516][T20175] loop2: p48 start 10 is beyond EOD, truncated [ 379.106775][T20175] loop2: p49 start 10 is beyond EOD, truncated [ 379.112934][T20175] loop2: p50 start 10 is beyond EOD, truncated [ 379.119112][T20175] loop2: p51 start 10 is beyond EOD, truncated [ 379.125283][T20175] loop2: p52 start 10 is beyond EOD, truncated [ 379.131432][T20175] loop2: p53 start 10 is beyond EOD, truncated [ 379.137949][T20175] loop2: p54 start 10 is beyond EOD, truncated [ 379.144095][T20175] loop2: p55 start 10 is beyond EOD, truncated [ 379.150256][T20175] loop2: p56 start 10 is beyond EOD, truncated [ 379.156413][T20175] loop2: p57 start 10 is beyond EOD, truncated [ 379.162578][T20175] loop2: p58 start 10 is beyond EOD, truncated [ 379.169127][T20175] loop2: p59 start 10 is beyond EOD, truncated [ 379.175337][T20175] loop2: p60 start 10 is beyond EOD, truncated [ 379.181581][T20175] loop2: p61 start 10 is beyond EOD, truncated [ 379.187738][T20175] loop2: p62 start 10 is beyond EOD, truncated [ 379.193882][T20175] loop2: p63 start 10 is beyond EOD, truncated [ 379.200140][T20175] loop2: p64 start 10 is beyond EOD, truncated [ 379.206297][T20175] loop2: p65 start 10 is beyond EOD, truncated [ 379.212442][T20175] loop2: p66 start 10 is beyond EOD, truncated [ 379.218607][T20175] loop2: p67 start 10 is beyond EOD, truncated [ 379.224796][T20175] loop2: p68 start 10 is beyond EOD, truncated [ 379.230954][T20175] loop2: p69 start 10 is beyond EOD, truncated [ 379.237125][T20175] loop2: p70 start 10 is beyond EOD, truncated [ 379.243266][T20175] loop2: p71 start 10 is beyond EOD, truncated [ 379.249426][T20175] loop2: p72 start 10 is beyond EOD, truncated [ 379.255688][T20175] loop2: p73 start 10 is beyond EOD, truncated [ 379.261969][T20175] loop2: p74 start 10 is beyond EOD, truncated [ 379.268123][T20175] loop2: p75 start 10 is beyond EOD, truncated [ 379.274289][T20175] loop2: p76 start 10 is beyond EOD, truncated [ 379.287581][T20175] loop2: p77 start 10 is beyond EOD, truncated [ 379.293721][T20175] loop2: p78 start 10 is beyond EOD, truncated [ 379.299879][T20175] loop2: p79 start 10 is beyond EOD, truncated [ 379.306081][T20175] loop2: p80 start 10 is beyond EOD, truncated [ 379.313016][T20175] loop2: p81 start 10 is beyond EOD, truncated [ 379.319222][T20175] loop2: p82 start 10 is beyond EOD, truncated [ 379.325642][T20175] loop2: p83 start 10 is beyond EOD, truncated [ 379.331953][T20175] loop2: p84 start 10 is beyond EOD, truncated [ 379.338118][T20175] loop2: p85 start 10 is beyond EOD, truncated [ 379.344294][T20175] loop2: p86 start 10 is beyond EOD, truncated [ 379.350546][T20175] loop2: p87 start 10 is beyond EOD, truncated [ 379.358518][T20175] loop2: p88 start 10 is beyond EOD, truncated [ 379.364907][T20175] loop2: p89 start 10 is beyond EOD, truncated [ 379.371227][T20175] loop2: p90 start 10 is beyond EOD, truncated [ 379.377649][T20175] loop2: p91 start 10 is beyond EOD, truncated [ 379.383802][T20175] loop2: p92 start 10 is beyond EOD, truncated [ 379.389966][T20175] loop2: p93 start 10 is beyond EOD, truncated [ 379.396214][T20175] loop2: p94 start 10 is beyond EOD, truncated [ 379.402527][T20175] loop2: p95 start 10 is beyond EOD, truncated [ 379.408728][T20175] loop2: p96 start 10 is beyond EOD, truncated [ 379.414887][T20175] loop2: p97 start 10 is beyond EOD, truncated [ 379.421030][T20175] loop2: p98 start 10 is beyond EOD, truncated [ 379.427182][T20175] loop2: p99 start 10 is beyond EOD, truncated [ 379.433403][T20175] loop2: p100 start 10 is beyond EOD, truncated [ 379.439739][T20175] loop2: p101 start 10 is beyond EOD, truncated [ 379.446080][T20175] loop2: p102 start 10 is beyond EOD, truncated [ 379.452314][T20175] loop2: p103 start 10 is beyond EOD, truncated [ 379.458569][T20175] loop2: p104 start 10 is beyond EOD, truncated [ 379.464828][T20175] loop2: p105 start 10 is beyond EOD, truncated [ 379.471088][T20175] loop2: p106 start 10 is beyond EOD, truncated [ 379.477343][T20175] loop2: p107 start 10 is beyond EOD, truncated [ 379.483574][T20175] loop2: p108 start 10 is beyond EOD, truncated [ 379.489928][T20175] loop2: p109 start 10 is beyond EOD, truncated [ 379.496280][T20175] loop2: p110 start 10 is beyond EOD, truncated [ 379.502550][T20175] loop2: p111 start 10 is beyond EOD, truncated [ 379.508953][T20175] loop2: p112 start 10 is beyond EOD, truncated [ 379.515231][T20175] loop2: p113 start 10 is beyond EOD, truncated [ 379.521473][T20175] loop2: p114 start 10 is beyond EOD, truncated [ 379.527739][T20175] loop2: p115 start 10 is beyond EOD, truncated [ 379.534003][T20175] loop2: p116 start 10 is beyond EOD, truncated [ 379.540301][T20175] loop2: p117 start 10 is beyond EOD, truncated [ 379.546571][T20175] loop2: p118 start 10 is beyond EOD, truncated [ 379.553060][T20175] loop2: p119 start 10 is beyond EOD, truncated [ 379.559312][T20175] loop2: p120 start 10 is beyond EOD, truncated [ 379.565566][T20175] loop2: p121 start 10 is beyond EOD, truncated [ 379.571799][T20175] loop2: p122 start 10 is beyond EOD, truncated [ 379.578154][T20175] loop2: p123 start 10 is beyond EOD, truncated [ 379.584412][T20175] loop2: p124 start 10 is beyond EOD, truncated [ 379.590667][T20175] loop2: p125 start 10 is beyond EOD, truncated [ 379.596992][T20175] loop2: p126 start 10 is beyond EOD, truncated [ 379.603319][T20175] loop2: p127 start 10 is beyond EOD, truncated [ 379.609579][T20175] loop2: p128 start 10 is beyond EOD, truncated [ 379.615834][T20175] loop2: p129 start 10 is beyond EOD, truncated [ 379.622072][T20175] loop2: p130 start 10 is beyond EOD, truncated [ 379.628313][T20175] loop2: p131 start 10 is beyond EOD, truncated [ 379.634567][T20175] loop2: p132 start 10 is beyond EOD, truncated [ 379.640794][T20175] loop2: p133 start 10 is beyond EOD, truncated [ 379.647051][T20175] loop2: p134 start 10 is beyond EOD, truncated [ 379.653288][T20175] loop2: p135 start 10 is beyond EOD, truncated [ 379.659610][T20175] loop2: p136 start 10 is beyond EOD, truncated [ 379.665864][T20175] loop2: p137 start 10 is beyond EOD, truncated [ 379.672365][T20175] loop2: p138 start 10 is beyond EOD, truncated [ 379.678654][T20175] loop2: p139 start 10 is beyond EOD, truncated [ 379.684903][T20175] loop2: p140 start 10 is beyond EOD, truncated [ 379.691137][T20175] loop2: p141 start 10 is beyond EOD, truncated [ 379.697380][T20175] loop2: p142 start 10 is beyond EOD, truncated [ 379.703611][T20175] loop2: p143 start 10 is beyond EOD, truncated [ 379.709912][T20175] loop2: p144 start 10 is beyond EOD, truncated [ 379.716233][T20175] loop2: p145 start 10 is beyond EOD, truncated [ 379.722562][T20175] loop2: p146 start 10 is beyond EOD, truncated [ 379.728804][T20175] loop2: p147 start 10 is beyond EOD, truncated [ 379.735051][T20175] loop2: p148 start 10 is beyond EOD, truncated [ 379.741319][T20175] loop2: p149 start 10 is beyond EOD, truncated [ 379.747576][T20175] loop2: p150 start 10 is beyond EOD, truncated [ 379.753834][T20175] loop2: p151 start 10 is beyond EOD, truncated [ 379.760166][T20175] loop2: p152 start 10 is beyond EOD, truncated [ 379.766411][T20175] loop2: p153 start 10 is beyond EOD, truncated [ 379.772783][T20175] loop2: p154 start 10 is beyond EOD, truncated [ 379.779035][T20175] loop2: p155 start 10 is beyond EOD, truncated [ 379.785306][T20175] loop2: p156 start 10 is beyond EOD, truncated [ 379.791537][T20175] loop2: p157 start 10 is beyond EOD, truncated [ 379.797780][T20175] loop2: p158 start 10 is beyond EOD, truncated [ 379.804598][T20175] loop2: p159 start 10 is beyond EOD, truncated [ 379.810833][T20175] loop2: p160 start 10 is beyond EOD, truncated [ 379.817145][T20175] loop2: p161 start 10 is beyond EOD, truncated [ 379.823444][T20175] loop2: p162 start 10 is beyond EOD, truncated [ 379.829686][T20175] loop2: p163 start 10 is beyond EOD, truncated [ 379.836003][T20175] loop2: p164 start 10 is beyond EOD, truncated [ 379.842313][T20175] loop2: p165 start 10 is beyond EOD, truncated [ 379.848556][T20175] loop2: p166 start 10 is beyond EOD, truncated [ 379.854860][T20175] loop2: p167 start 10 is beyond EOD, truncated [ 379.861098][T20175] loop2: p168 start 10 is beyond EOD, truncated [ 379.867435][T20175] loop2: p169 start 10 is beyond EOD, truncated [ 379.873669][T20175] loop2: p170 start 10 is beyond EOD, truncated [ 379.880025][T20175] loop2: p171 start 10 is beyond EOD, truncated [ 379.886342][T20175] loop2: p172 start 10 is beyond EOD, truncated [ 379.892587][T20175] loop2: p173 start 10 is beyond EOD, truncated [ 379.899008][T20175] loop2: p174 start 10 is beyond EOD, truncated [ 379.905309][T20175] loop2: p175 start 10 is beyond EOD, truncated [ 379.911626][T20175] loop2: p176 start 10 is beyond EOD, truncated [ 379.917925][T20175] loop2: p177 start 10 is beyond EOD, truncated [ 379.924310][T20175] loop2: p178 start 10 is beyond EOD, truncated [ 379.930598][T20175] loop2: p179 start 10 is beyond EOD, truncated [ 379.936995][T20175] loop2: p180 start 10 is beyond EOD, truncated [ 379.943287][T20175] loop2: p181 start 10 is beyond EOD, truncated [ 379.949547][T20175] loop2: p182 start 10 is beyond EOD, truncated [ 379.955833][T20175] loop2: p183 start 10 is beyond EOD, truncated [ 379.962172][T20175] loop2: p184 start 10 is beyond EOD, truncated [ 379.968434][T20175] loop2: p185 start 10 is beyond EOD, truncated [ 379.974679][T20175] loop2: p186 start 10 is beyond EOD, truncated [ 379.980936][T20175] loop2: p187 start 10 is beyond EOD, truncated [ 379.987288][T20175] loop2: p188 start 10 is beyond EOD, truncated [ 379.993521][T20175] loop2: p189 start 10 is beyond EOD, truncated [ 379.999862][T20175] loop2: p190 start 10 is beyond EOD, truncated [ 380.006266][T20175] loop2: p191 start 10 is beyond EOD, truncated [ 380.012545][T20175] loop2: p192 start 10 is beyond EOD, truncated [ 380.018843][T20175] loop2: p193 start 10 is beyond EOD, truncated [ 380.025115][T20175] loop2: p194 start 10 is beyond EOD, truncated [ 380.031370][T20175] loop2: p195 start 10 is beyond EOD, truncated [ 380.037867][T20175] loop2: p196 start 10 is beyond EOD, truncated [ 380.044198][T20175] loop2: p197 start 10 is beyond EOD, truncated [ 380.050435][T20175] loop2: p198 start 10 is beyond EOD, truncated [ 380.056773][T20175] loop2: p199 start 10 is beyond EOD, truncated [ 380.063024][T20175] loop2: p200 start 10 is beyond EOD, truncated [ 380.069279][T20175] loop2: p201 start 10 is beyond EOD, truncated [ 380.075616][T20175] loop2: p202 start 10 is beyond EOD, truncated [ 380.083409][T20175] loop2: p203 start 10 is beyond EOD, truncated [ 380.089721][T20175] loop2: p204 start 10 is beyond EOD, truncated [ 380.096442][T20175] loop2: p205 start 10 is beyond EOD, truncated [ 380.102676][T20175] loop2: p206 start 10 is beyond EOD, truncated [ 380.109031][T20175] loop2: p207 start 10 is beyond EOD, truncated [ 380.116318][T20175] loop2: p208 start 10 is beyond EOD, truncated [ 380.122550][T20175] loop2: p209 start 10 is beyond EOD, truncated [ 380.128802][T20175] loop2: p210 start 10 is beyond EOD, truncated [ 380.135109][T20175] loop2: p211 start 10 is beyond EOD, truncated [ 380.141341][T20175] loop2: p212 start 10 is beyond EOD, truncated [ 380.147586][T20175] loop2: p213 start 10 is beyond EOD, truncated [ 380.153819][T20175] loop2: p214 start 10 is beyond EOD, truncated [ 380.160180][T20175] loop2: p215 start 10 is beyond EOD, truncated [ 380.166793][T20175] loop2: p216 start 10 is beyond EOD, truncated [ 380.173069][T20175] loop2: p217 start 10 is beyond EOD, truncated [ 380.179319][T20175] loop2: p218 start 10 is beyond EOD, truncated [ 380.185566][T20175] loop2: p219 start 10 is beyond EOD, truncated [ 380.191832][T20175] loop2: p220 start 10 is beyond EOD, truncated [ 380.198082][T20175] loop2: p221 start 10 is beyond EOD, truncated [ 380.204336][T20175] loop2: p222 start 10 is beyond EOD, truncated [ 380.210629][T20175] loop2: p223 start 10 is beyond EOD, truncated [ 380.216902][T20175] loop2: p224 start 10 is beyond EOD, truncated [ 380.223157][T20175] loop2: p225 start 10 is beyond EOD, truncated [ 380.229416][T20175] loop2: p226 start 10 is beyond EOD, truncated [ 380.235762][T20175] loop2: p227 start 10 is beyond EOD, truncated [ 380.242070][T20175] loop2: p228 start 10 is beyond EOD, truncated [ 380.248395][T20175] loop2: p229 start 10 is beyond EOD, truncated [ 380.254658][T20175] loop2: p230 start 10 is beyond EOD, truncated [ 380.260905][T20175] loop2: p231 start 10 is beyond EOD, truncated [ 380.267212][T20175] loop2: p232 start 10 is beyond EOD, truncated [ 380.273445][T20175] loop2: p233 start 10 is beyond EOD, truncated [ 380.279695][T20175] loop2: p234 start 10 is beyond EOD, truncated [ 380.285940][T20175] loop2: p235 start 10 is beyond EOD, truncated [ 380.292176][T20175] loop2: p236 start 10 is beyond EOD, truncated [ 380.298524][T20175] loop2: p237 start 10 is beyond EOD, truncated [ 380.304776][T20175] loop2: p238 start 10 is beyond EOD, truncated [ 380.311008][T20175] loop2: p239 start 10 is beyond EOD, truncated [ 380.317279][T20175] loop2: p240 start 10 is beyond EOD, truncated [ 380.323586][T20175] loop2: p241 start 10 is beyond EOD, truncated [ 380.329881][T20175] loop2: p242 start 10 is beyond EOD, truncated [ 380.336179][T20175] loop2: p243 start 10 is beyond EOD, truncated [ 380.342421][T20175] loop2: p244 start 10 is beyond EOD, truncated [ 380.348692][T20175] loop2: p245 start 10 is beyond EOD, truncated [ 380.354954][T20175] loop2: p246 start 10 is beyond EOD, truncated [ 380.361192][T20175] loop2: p247 start 10 is beyond EOD, truncated [ 380.367510][T20175] loop2: p248 start 10 is beyond EOD, truncated [ 380.373774][T20175] loop2: p249 start 10 is beyond EOD, truncated [ 380.380038][T20175] loop2: p250 start 10 is beyond EOD, truncated [ 380.386291][T20175] loop2: p251 start 10 is beyond EOD, truncated [ 380.392522][T20175] loop2: p252 start 10 is beyond EOD, truncated [ 380.398824][T20175] loop2: p253 start 10 is beyond EOD, truncated [ 380.405071][T20175] loop2: p254 start 10 is beyond EOD, truncated [ 380.411311][T20175] loop2: p255 start 10 is beyond EOD, truncated [ 380.425274][ T1029] loop2: p1 p2 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p2 [ 380.425455][ T1029] loop2: p1 start 10 is beyond EOD, [ 380.494173][ T25] kauditd_printk_skb: 61530 callbacks suppressed [ 380.494184][ T25] audit: type=1326 audit(1619743114.777:2379401): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 380.512471][ T1029] truncated [ 380.522160][ T25] audit: type=1326 audit(1619743114.807:2379402): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 380.527890][ T1029] loop2: p2 size 2 extends beyond EOD, truncated [ 380.539253][ T1029] loop2: p3 start 225 is beyond EOD, [ 380.552979][ T25] audit: type=1326 audit(1619743114.807:2379403): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 380.555464][ T1029] truncated [ 380.581379][ T25] audit: type=1326 audit(1619743114.807:2379404): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 380.586195][ T1029] loop2: p4 size 3657465856 extends beyond EOD, truncated [ 380.592355][ T25] audit: type=1326 audit(1619743114.807:2379405): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 380.617531][ T1029] loop2: p5 start 10 is beyond EOD, [ 380.621091][ T25] audit: type=1326 audit(1619743114.807:2379406): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 380.645112][ T1029] truncated [ 380.645119][ T1029] loop2: p6 start 10 is beyond EOD, [ 380.653326][ T25] audit: type=1326 audit(1619743114.807:2379407): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 380.678037][ T1029] truncated [ 380.678045][ T1029] loop2: p7 start 10 is beyond EOD, truncated [ 380.678060][ T1029] loop2: p8 start 10 is beyond EOD, truncated [ 380.678069][ T1029] loop2: p9 start 10 is beyond EOD, [ 380.685212][ T25] audit: type=1326 audit(1619743114.807:2379408): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 380.708107][ T1029] truncated [ 380.708113][ T1029] loop2: p10 start 10 is beyond EOD, [ 380.712345][ T25] audit: type=1326 audit(1619743114.807:2379409): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 380.716517][ T1029] truncated [ 380.716522][ T1029] loop2: p11 start 10 is beyond EOD, [ 380.741458][ T25] audit: type=1326 audit(1619743114.807:2379410): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 380.743964][ T1029] truncated [ 380.743969][ T1029] loop2: p12 start 10 is beyond EOD, truncated [ 380.861807][ T1029] loop2: p13 start 10 is beyond EOD, truncated [ 380.868140][ T1029] loop2: p14 start 10 is beyond EOD, truncated [ 380.874387][ T1029] loop2: p15 start 10 is beyond EOD, truncated [ 380.880570][ T1029] loop2: p16 start 10 is beyond EOD, truncated [ 380.886798][ T1029] loop2: p17 start 10 is beyond EOD, truncated [ 380.893052][ T1029] loop2: p18 start 10 is beyond EOD, truncated [ 380.899219][ T1029] loop2: p19 start 10 is beyond EOD, truncated [ 380.905396][ T1029] loop2: p20 start 10 is beyond EOD, truncated [ 380.911608][ T1029] loop2: p21 start 10 is beyond EOD, truncated [ 380.917769][ T1029] loop2: p22 start 10 is beyond EOD, truncated [ 380.923982][ T1029] loop2: p23 start 10 is beyond EOD, truncated [ 380.930159][ T1029] loop2: p24 start 10 is beyond EOD, truncated [ 380.936518][ T1029] loop2: p25 start 10 is beyond EOD, truncated [ 380.942761][ T1029] loop2: p26 start 10 is beyond EOD, truncated [ 380.950168][ T1029] loop2: p27 start 10 is beyond EOD, truncated [ 380.956363][ T1029] loop2: p28 start 10 is beyond EOD, truncated [ 380.962522][ T1029] loop2: p29 start 10 is beyond EOD, truncated [ 380.968685][ T1029] loop2: p30 start 10 is beyond EOD, truncated [ 380.976245][ T1029] loop2: p31 start 10 is beyond EOD, truncated [ 380.982494][ T1029] loop2: p32 start 10 is beyond EOD, truncated [ 380.989028][ T1029] loop2: p33 start 10 is beyond EOD, truncated [ 380.995189][ T1029] loop2: p34 start 10 is beyond EOD, truncated [ 381.001334][ T1029] loop2: p35 start 10 is beyond EOD, truncated [ 381.007606][ T1029] loop2: p36 start 10 is beyond EOD, truncated [ 381.013945][ T1029] loop2: p37 start 10 is beyond EOD, truncated [ 381.020107][ T1029] loop2: p38 start 10 is beyond EOD, truncated [ 381.026311][ T1029] loop2: p39 start 10 is beyond EOD, truncated [ 381.032809][ T1029] loop2: p40 start 10 is beyond EOD, truncated [ 381.039081][ T1029] loop2: p41 start 10 is beyond EOD, truncated [ 381.045285][ T1029] loop2: p42 start 10 is beyond EOD, truncated [ 381.052025][ T1029] loop2: p43 start 10 is beyond EOD, truncated [ 381.058184][ T1029] loop2: p44 start 10 is beyond EOD, truncated [ 381.064725][ T1029] loop2: p45 start 10 is beyond EOD, truncated [ 381.070874][ T1029] loop2: p46 start 10 is beyond EOD, truncated [ 381.077819][ T1029] loop2: p47 start 10 is beyond EOD, truncated [ 381.083958][ T1029] loop2: p48 start 10 is beyond EOD, truncated [ 381.090147][ T1029] loop2: p49 start 10 is beyond EOD, truncated [ 381.096396][ T1029] loop2: p50 start 10 is beyond EOD, truncated [ 381.102719][ T1029] loop2: p51 start 10 is beyond EOD, truncated [ 381.108995][ T1029] loop2: p52 start 10 is beyond EOD, truncated [ 381.116381][ T1029] loop2: p53 start 10 is beyond EOD, truncated [ 381.123314][ T1029] loop2: p54 start 10 is beyond EOD, truncated [ 381.129675][ T1029] loop2: p55 start 10 is beyond EOD, truncated [ 381.136372][ T1029] loop2: p56 start 10 is beyond EOD, truncated [ 381.142640][ T1029] loop2: p57 start 10 is beyond EOD, truncated [ 381.149031][ T1029] loop2: p58 start 10 is beyond EOD, truncated [ 381.155208][ T1029] loop2: p59 start 10 is beyond EOD, truncated [ 381.161627][ T1029] loop2: p60 start 10 is beyond EOD, truncated [ 381.168620][ T1029] loop2: p61 start 10 is beyond EOD, truncated [ 381.174878][ T1029] loop2: p62 start 10 is beyond EOD, truncated [ 381.181371][ T1029] loop2: p63 start 10 is beyond EOD, truncated [ 381.187903][ T1029] loop2: p64 start 10 is beyond EOD, truncated [ 381.195288][ T1029] loop2: p65 start 10 is beyond EOD, truncated [ 381.206782][ T1029] loop2: p66 start 10 is beyond EOD, truncated [ 381.213189][ T1029] loop2: p67 start 10 is beyond EOD, truncated [ 381.219627][ T1029] loop2: p68 start 10 is beyond EOD, truncated [ 381.226809][ T1029] loop2: p69 start 10 is beyond EOD, truncated [ 381.233101][ T1029] loop2: p70 start 10 is beyond EOD, truncated [ 381.239258][ T1029] loop2: p71 start 10 is beyond EOD, truncated [ 381.245421][ T1029] loop2: p72 start 10 is beyond EOD, truncated [ 381.251561][ T1029] loop2: p73 start 10 is beyond EOD, truncated [ 381.257765][ T1029] loop2: p74 start 10 is beyond EOD, truncated [ 381.264188][ T1029] loop2: p75 start 10 is beyond EOD, truncated [ 381.270330][ T1029] loop2: p76 start 10 is beyond EOD, truncated [ 381.276499][ T1029] loop2: p77 start 10 is beyond EOD, truncated [ 381.283168][ T1029] loop2: p78 start 10 is beyond EOD, truncated [ 381.289444][ T1029] loop2: p79 start 10 is beyond EOD, truncated [ 381.295708][ T1029] loop2: p80 start 10 is beyond EOD, truncated [ 381.301950][ T1029] loop2: p81 start 10 is beyond EOD, truncated [ 381.308145][ T1029] loop2: p82 start 10 is beyond EOD, truncated [ 381.314402][ T1029] loop2: p83 start 10 is beyond EOD, truncated [ 381.320549][ T1029] loop2: p84 start 10 is beyond EOD, truncated [ 381.327092][ T1029] loop2: p85 start 10 is beyond EOD, truncated [ 381.333734][ T1029] loop2: p86 start 10 is beyond EOD, truncated [ 381.341043][ T1029] loop2: p87 start 10 is beyond EOD, truncated [ 381.348847][ T1029] loop2: p88 start 10 is beyond EOD, truncated [ 381.355035][ T1029] loop2: p89 start 10 is beyond EOD, truncated [ 381.361354][ T1029] loop2: p90 start 10 is beyond EOD, truncated [ 381.367542][ T1029] loop2: p91 start 10 is beyond EOD, truncated [ 381.373771][ T1029] loop2: p92 start 10 is beyond EOD, truncated [ 381.380235][ T1029] loop2: p93 start 10 is beyond EOD, truncated [ 381.387062][ T1029] loop2: p94 start 10 is beyond EOD, truncated [ 381.393711][ T1029] loop2: p95 start 10 is beyond EOD, truncated [ 381.400374][ T1029] loop2: p96 start 10 is beyond EOD, truncated [ 381.408414][ T1029] loop2: p97 start 10 is beyond EOD, truncated [ 381.414664][ T1029] loop2: p98 start 10 is beyond EOD, truncated [ 381.421076][ T1029] loop2: p99 start 10 is beyond EOD, truncated [ 381.427581][ T1029] loop2: p100 start 10 is beyond EOD, truncated [ 381.433843][ T1029] loop2: p101 start 10 is beyond EOD, truncated [ 381.440271][ T1029] loop2: p102 start 10 is beyond EOD, truncated [ 381.446938][ T1029] loop2: p103 start 10 is beyond EOD, truncated [ 381.454168][ T1029] loop2: p104 start 10 is beyond EOD, truncated [ 381.461670][ T1029] loop2: p105 start 10 is beyond EOD, truncated [ 381.468013][ T1029] loop2: p106 start 10 is beyond EOD, truncated [ 381.474884][ T1029] loop2: p107 start 10 is beyond EOD, truncated [ 381.481425][ T1029] loop2: p108 start 10 is beyond EOD, truncated [ 381.489083][ T1029] loop2: p109 start 10 is beyond EOD, truncated [ 381.495899][ T1029] loop2: p110 start 10 is beyond EOD, truncated [ 381.504213][ T1029] loop2: p111 start 10 is beyond EOD, truncated [ 381.515151][ T1029] loop2: p112 start 10 is beyond EOD, truncated [ 381.521687][ T1029] loop2: p113 start 10 is beyond EOD, truncated [ 381.528814][ T1029] loop2: p114 start 10 is beyond EOD, truncated [ 381.535071][ T1029] loop2: p115 start 10 is beyond EOD, truncated [ 381.541668][ T1029] loop2: p116 start 10 is beyond EOD, truncated [ 381.547919][ T1029] loop2: p117 start 10 is beyond EOD, truncated [ 381.555658][ T1029] loop2: p118 start 10 is beyond EOD, truncated [ 381.561903][ T1029] loop2: p119 start 10 is beyond EOD, truncated [ 381.568442][ T1029] loop2: p120 start 10 is beyond EOD, truncated [ 381.576539][ T1029] loop2: p121 start 10 is beyond EOD, truncated [ 381.582957][ T1029] loop2: p122 start 10 is beyond EOD, truncated [ 381.589846][ T1029] loop2: p123 start 10 is beyond EOD, truncated [ 381.596123][ T1029] loop2: p124 start 10 is beyond EOD, truncated [ 381.602363][ T1029] loop2: p125 start 10 is beyond EOD, truncated [ 381.608606][ T1029] loop2: p126 start 10 is beyond EOD, truncated [ 381.614856][ T1029] loop2: p127 start 10 is beyond EOD, truncated [ 381.621093][ T1029] loop2: p128 start 10 is beyond EOD, truncated [ 381.627486][ T1029] loop2: p129 start 10 is beyond EOD, truncated [ 381.633717][ T1029] loop2: p130 start 10 is beyond EOD, truncated [ 381.639970][ T1029] loop2: p131 start 10 is beyond EOD, truncated [ 381.646233][ T1029] loop2: p132 start 10 is beyond EOD, truncated [ 381.652461][ T1029] loop2: p133 start 10 is beyond EOD, truncated [ 381.658709][ T1029] loop2: p134 start 10 is beyond EOD, truncated [ 381.665113][ T1029] loop2: p135 start 10 is beyond EOD, truncated [ 381.671341][ T1029] loop2: p136 start 10 is beyond EOD, truncated [ 381.677580][ T1029] loop2: p137 start 10 is beyond EOD, truncated [ 381.683802][ T1029] loop2: p138 start 10 is beyond EOD, truncated [ 381.690062][ T1029] loop2: p139 start 10 is beyond EOD, truncated [ 381.696325][ T1029] loop2: p140 start 10 is beyond EOD, truncated [ 381.702573][ T1029] loop2: p141 start 10 is beyond EOD, truncated [ 381.708819][ T1029] loop2: p142 start 10 is beyond EOD, truncated [ 381.715147][ T1029] loop2: p143 start 10 is beyond EOD, truncated [ 381.721379][ T1029] loop2: p144 start 10 is beyond EOD, truncated [ 381.727643][ T1029] loop2: p145 start 10 is beyond EOD, truncated [ 381.733872][ T1029] loop2: p146 start 10 is beyond EOD, truncated [ 381.740176][ T1029] loop2: p147 start 10 is beyond EOD, truncated [ 381.746432][ T1029] loop2: p148 start 10 is beyond EOD, truncated [ 381.752670][ T1029] loop2: p149 start 10 is beyond EOD, truncated [ 381.759287][ T1029] loop2: p150 start 10 is beyond EOD, truncated [ 381.765541][ T1029] loop2: p151 start 10 is beyond EOD, truncated [ 381.771771][ T1029] loop2: p152 start 10 is beyond EOD, truncated [ 381.778083][ T1029] loop2: p153 start 10 is beyond EOD, truncated [ 381.784335][ T1029] loop2: p154 start 10 is beyond EOD, truncated [ 381.790594][ T1029] loop2: p155 start 10 is beyond EOD, truncated [ 381.796882][ T1029] loop2: p156 start 10 is beyond EOD, truncated [ 381.803181][ T1029] loop2: p157 start 10 is beyond EOD, truncated [ 381.809446][ T1029] loop2: p158 start 10 is beyond EOD, truncated [ 381.815725][ T1029] loop2: p159 start 10 is beyond EOD, truncated [ 381.821990][ T1029] loop2: p160 start 10 is beyond EOD, truncated [ 381.828451][ T1029] loop2: p161 start 10 is beyond EOD, truncated [ 381.834792][ T1029] loop2: p162 start 10 is beyond EOD, truncated [ 381.841029][ T1029] loop2: p163 start 10 is beyond EOD, truncated [ 381.847298][ T1029] loop2: p164 start 10 is beyond EOD, truncated [ 381.853573][ T1029] loop2: p165 start 10 is beyond EOD, truncated [ 381.859824][ T1029] loop2: p166 start 10 is beyond EOD, truncated [ 381.866076][ T1029] loop2: p167 start 10 is beyond EOD, truncated [ 381.872311][ T1029] loop2: p168 start 10 is beyond EOD, truncated [ 381.878572][ T1029] loop2: p169 start 10 is beyond EOD, truncated [ 381.884826][ T1029] loop2: p170 start 10 is beyond EOD, truncated [ 381.891108][ T1029] loop2: p171 start 10 is beyond EOD, truncated [ 381.897356][ T1029] loop2: p172 start 10 is beyond EOD, truncated [ 381.904386][ T1029] loop2: p173 start 10 is beyond EOD, truncated [ 381.910617][ T1029] loop2: p174 start 10 is beyond EOD, truncated [ 381.916877][ T1029] loop2: p175 start 10 is beyond EOD, truncated [ 381.923105][ T1029] loop2: p176 start 10 is beyond EOD, truncated [ 381.929363][ T1029] loop2: p177 start 10 is beyond EOD, truncated [ 381.935735][ T1029] loop2: p178 start 10 is beyond EOD, truncated [ 381.942032][ T1029] loop2: p179 start 10 is beyond EOD, truncated [ 381.948284][ T1029] loop2: p180 start 10 is beyond EOD, truncated [ 381.954543][ T1029] loop2: p181 start 10 is beyond EOD, truncated [ 381.960783][ T1029] loop2: p182 start 10 is beyond EOD, truncated [ 381.967037][ T1029] loop2: p183 start 10 is beyond EOD, truncated [ 381.973285][ T1029] loop2: p184 start 10 is beyond EOD, truncated [ 381.979599][ T1029] loop2: p185 start 10 is beyond EOD, truncated [ 381.985975][ T1029] loop2: p186 start 10 is beyond EOD, truncated [ 381.992429][ T1029] loop2: p187 start 10 is beyond EOD, truncated [ 381.998701][ T1029] loop2: p188 start 10 is beyond EOD, truncated [ 382.004966][ T1029] loop2: p189 start 10 is beyond EOD, truncated [ 382.011219][ T1029] loop2: p190 start 10 is beyond EOD, truncated [ 382.017472][ T1029] loop2: p191 start 10 is beyond EOD, truncated [ 382.023769][ T1029] loop2: p192 start 10 is beyond EOD, truncated [ 382.030018][ T1029] loop2: p193 start 10 is beyond EOD, truncated [ 382.036266][ T1029] loop2: p194 start 10 is beyond EOD, truncated [ 382.042510][ T1029] loop2: p195 start 10 is beyond EOD, truncated [ 382.048772][ T1029] loop2: p196 start 10 is beyond EOD, truncated [ 382.055084][ T1029] loop2: p197 start 10 is beyond EOD, truncated [ 382.061746][ T1029] loop2: p198 start 10 is beyond EOD, truncated [ 382.068149][ T1029] loop2: p199 start 10 is beyond EOD, truncated [ 382.074554][ T1029] loop2: p200 start 10 is beyond EOD, truncated [ 382.080798][ T1029] loop2: p201 start 10 is beyond EOD, truncated [ 382.087057][ T1029] loop2: p202 start 10 is beyond EOD, truncated [ 382.093853][ T1029] loop2: p203 start 10 is beyond EOD, truncated [ 382.100109][ T1029] loop2: p204 start 10 is beyond EOD, truncated [ 382.106386][ T1029] loop2: p205 start 10 is beyond EOD, truncated [ 382.112621][ T1029] loop2: p206 start 10 is beyond EOD, truncated [ 382.118869][ T1029] loop2: p207 start 10 is beyond EOD, truncated [ 382.125249][ T1029] loop2: p208 start 10 is beyond EOD, truncated [ 382.131612][ T1029] loop2: p209 start 10 is beyond EOD, truncated [ 382.137916][ T1029] loop2: p210 start 10 is beyond EOD, truncated [ 382.144608][ T1029] loop2: p211 start 10 is beyond EOD, truncated [ 382.150843][ T1029] loop2: p212 start 10 is beyond EOD, truncated [ 382.157121][ T1029] loop2: p213 start 10 is beyond EOD, truncated [ 382.163351][ T1029] loop2: p214 start 10 is beyond EOD, truncated [ 382.169611][ T1029] loop2: p215 start 10 is beyond EOD, truncated [ 382.175958][ T1029] loop2: p216 start 10 is beyond EOD, truncated [ 382.182545][ T1029] loop2: p217 start 10 is beyond EOD, truncated [ 382.188802][ T1029] loop2: p218 start 10 is beyond EOD, truncated [ 382.195062][ T1029] loop2: p219 start 10 is beyond EOD, truncated [ 382.201299][ T1029] loop2: p220 start 10 is beyond EOD, truncated [ 382.207552][ T1029] loop2: p221 start 10 is beyond EOD, truncated [ 382.213778][ T1029] loop2: p222 start 10 is beyond EOD, truncated [ 382.220106][ T1029] loop2: p223 start 10 is beyond EOD, truncated [ 382.226370][ T1029] loop2: p224 start 10 is beyond EOD, truncated [ 382.232596][ T1029] loop2: p225 start 10 is beyond EOD, truncated [ 382.238837][ T1029] loop2: p226 start 10 is beyond EOD, truncated [ 382.245176][ T1029] loop2: p227 start 10 is beyond EOD, truncated [ 382.251408][ T1029] loop2: p228 start 10 is beyond EOD, truncated [ 382.257756][ T1029] loop2: p229 start 10 is beyond EOD, truncated [ 382.264038][ T1029] loop2: p230 start 10 is beyond EOD, truncated [ 382.270273][ T1029] loop2: p231 start 10 is beyond EOD, truncated [ 382.276537][ T1029] loop2: p232 start 10 is beyond EOD, truncated [ 382.282767][ T1029] loop2: p233 start 10 is beyond EOD, truncated [ 382.289119][ T1029] loop2: p234 start 10 is beyond EOD, truncated [ 382.295370][ T1029] loop2: p235 start 10 is beyond EOD, truncated [ 382.301599][ T1029] loop2: p236 start 10 is beyond EOD, truncated [ 382.307867][ T1029] loop2: p237 start 10 is beyond EOD, truncated [ 382.314134][ T1029] loop2: p238 start 10 is beyond EOD, truncated [ 382.320889][ T1029] loop2: p239 start 10 is beyond EOD, truncated [ 382.327256][ T1029] loop2: p240 start 10 is beyond EOD, truncated [ 382.333486][ T1029] loop2: p241 start 10 is beyond EOD, truncated [ 382.339735][ T1029] loop2: p242 start 10 is beyond EOD, truncated [ 382.345992][ T1029] loop2: p243 start 10 is beyond EOD, truncated [ 382.352240][ T1029] loop2: p244 start 10 is beyond EOD, truncated [ 382.358835][ T1029] loop2: p245 start 10 is beyond EOD, truncated [ 382.365095][ T1029] loop2: p246 start 10 is beyond EOD, truncated [ 382.371365][ T1029] loop2: p247 start 10 is beyond EOD, truncated [ 382.377624][ T1029] loop2: p248 start 10 is beyond EOD, truncated [ 382.383857][ T1029] loop2: p249 start 10 is beyond EOD, truncated [ 382.390271][ T1029] loop2: p250 start 10 is beyond EOD, truncated [ 382.396537][ T1029] loop2: p251 start 10 is beyond EOD, truncated [ 382.403455][ T1029] loop2: p252 start 10 is beyond EOD, truncated [ 382.409705][ T1029] loop2: p253 start 10 is beyond EOD, truncated 00:38:36 executing program 4: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffff}) pwrite64(r3, &(0x7f0000000200)="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", 0x200, 0x0) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) 00:38:36 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x3) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, 0x0, 0x78) 00:38:36 executing program 5: r0 = socket$inet(0x10, 0x80002, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="24000000210007041dfffd946f610500020000e8fe0208010001080008000e000400ff7e", 0x24}], 0x1}, 0x0) 00:38:36 executing program 3: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_type(r1, &(0x7f0000000140), 0xffffff1f) perf_event_open(&(0x7f000001d000)={0x1, 0x70}, 0x0, 0x0, r0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0x28000, 0x1000004, 0x8031, 0xffffffffffffffff, 0x0) 00:38:36 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)={0x18, 0x1, 0x2, 0x401, 0x0, 0x0, {0x2}, [@CTA_EXPECT_MASTER={0x4}]}, 0x18}}, 0x0) 00:38:36 executing program 2: madvise(&(0x7f0000000000/0x4000)=nil, 0xfffffffffffffff4, 0x14) 00:38:36 executing program 0: mlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1000, 0x3, &(0x7f0000ff9000/0x1000)=nil) mremap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000ff8000/0x4000)=nil) [ 382.415951][ T1029] loop2: p254 start 10 is beyond EOD, truncated [ 382.422219][ T1029] loop2: p255 start 10 is beyond EOD, truncated 00:38:36 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000200)="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", 0x134}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r0, 0x0, 0x0) 00:38:36 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x40084504, 0x0) 00:38:36 executing program 5: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$search(0xa, r0, &(0x7f0000000100)='cifs.spnego\x00', &(0x7f0000000140)={'syz', 0x1}, 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$set_timeout(0xf, r2, 0x0) 00:38:36 executing program 1: set_mempolicy(0x2, &(0x7f0000000000)=0x1f, 0x6) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x35}, {0x6}]}) 00:38:36 executing program 2: r0 = socket$inet(0x2, 0x6000000000000003, 0x6) setsockopt$inet_int(r0, 0x0, 0x19, &(0x7f0000000000)=0x85f, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000002540)={0x0, 0x0, 0x0}, 0x0) 00:38:37 executing program 4: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2, 0x840000000000a132, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000540)='memory.events\x00', 0xb00000000065808, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r0, &(0x7f0000000140), 0xff4d) sendfile(r2, r1, 0x0, 0xffffffff800) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xffff}) pwrite64(r3, &(0x7f0000000200)="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", 0x200, 0x0) sendfile(r2, r1, &(0x7f0000000040), 0x100000001) 00:38:37 executing program 0: sched_setattr(0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000000440)={0x0, 0x12}, &(0x7f0000000040)) r0 = syz_open_dev$usbmon(&(0x7f0000000380), 0x0, 0x0) ioctl$MON_IOCX_GETX(r0, 0x4018920a, &(0x7f0000000100)={0x0, 0x0}) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f0000000080)={0x0, 0x0, 0x5}) read$usbmon(r0, 0x0, 0x0) r1 = getpid() timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) tkill(r1, 0x800000015) 00:38:37 executing program 5: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$search(0xa, r0, &(0x7f0000000100)='cifs.spnego\x00', &(0x7f0000000140)={'syz', 0x1}, 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$set_timeout(0xf, r2, 0x0) 00:38:37 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$search(0xa, r0, &(0x7f0000000100)='cifs.spnego\x00', &(0x7f0000000140)={'syz', 0x1}, 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$set_timeout(0xf, r2, 0x0) 00:38:37 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x4e, &(0x7f0000000440)="c4c691019919da078a0098d1e0a593b040f7629100f06ee04fa4ea57ff22ea97be19af3dcba01419cd2386ad59157689c9c6a47312334c2a97ac2b7f0fb4aabebae8dc5dffbcd48a70502173d6ef"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x34) 00:38:37 executing program 3: r0 = fsopen(&(0x7f0000000080)='proc\x00', 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x0, &(0x7f0000000000)='ro\x00', 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x7, 0x0, 0x0, 0x0) 00:38:37 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000380)=0x1, 0x4) sendto$inet6(r0, 0x0, 0xffffffffffffff18, 0x0, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @dev}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvmsg(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x12160) 00:38:37 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$search(0xa, r0, &(0x7f0000000100)='cifs.spnego\x00', &(0x7f0000000140)={'syz', 0x1}, 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$set_timeout(0xf, r2, 0x0) 00:38:37 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x4e, &(0x7f0000000440)="c4c691019919da078a0098d1e0a593b040f7629100f06ee04fa4ea57ff22ea97be19af3dcba01419cd2386ad59157689c9c6a47312334c2a97ac2b7f0fb4aabebae8dc5dffbcd48a70502173d6ef"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x34) 00:38:37 executing program 5: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$search(0xa, r0, &(0x7f0000000100)='cifs.spnego\x00', &(0x7f0000000140)={'syz', 0x1}, 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$set_timeout(0xf, r2, 0x0) 00:38:37 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$search(0xa, r0, &(0x7f0000000100)='cifs.spnego\x00', &(0x7f0000000140)={'syz', 0x1}, 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$set_timeout(0xf, r2, 0x0) 00:38:37 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000340)={@in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0xd, 0x0, "c74746fce09eede01f17d9ae157156624fcb152a41f5fb6a448ebbe4493e2a4ceb22453f13388ef5683e81c5554b290c6c6c7f8e080a53aceffbfec4df1100"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}}, 0x0, 0x3f, 0x42, 0x0, "00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de00"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000000)={@in6={{0xa, 0x0, 0x0, @dev}}, 0x0, 0x0, 0x17, 0x0, "cbca7ff69f34a5a903e564b8e0eee22410c6a77800c5e495f6aa2e4f6cf9feb98b7bab36cc908670e89e9c47e7df225419818076af6d886d48f7919bec3424460f119916fdb03eabec5ed82e45a3e5ad"}, 0xd8) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000020, &(0x7f000023f000)=0xa, 0x263) 00:38:38 executing program 0: sched_setattr(0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000000440)={0x0, 0x12}, &(0x7f0000000040)) r0 = syz_open_dev$usbmon(&(0x7f0000000380), 0x0, 0x0) ioctl$MON_IOCX_GETX(r0, 0x4018920a, &(0x7f0000000100)={0x0, 0x0}) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f0000000080)={0x0, 0x0, 0x5}) read$usbmon(r0, 0x0, 0x0) r1 = getpid() timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) tkill(r1, 0x800000015) 00:38:38 executing program 5: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$search(0xa, r0, &(0x7f0000000100)='cifs.spnego\x00', &(0x7f0000000140)={'syz', 0x1}, 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$set_timeout(0xf, r2, 0x0) 00:38:38 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x4e, &(0x7f0000000440)="c4c691019919da078a0098d1e0a593b040f7629100f06ee04fa4ea57ff22ea97be19af3dcba01419cd2386ad59157689c9c6a47312334c2a97ac2b7f0fb4aabebae8dc5dffbcd48a70502173d6ef"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x34) 00:38:38 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000100), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x40505330, &(0x7f0000000140)={0x80}) 00:38:38 executing program 2: unshare(0x2040400) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:38:38 executing program 4: clone3(&(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000200)=[0xffffffffffffffff], 0x1}, 0x58) clone3(&(0x7f0000000580)={0x156000100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:38:38 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000000580)={0x0, 0x6, '\x00', [@hao={0xc9, 0x10, @mcast2}, @padn={0x1, 0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @pad1, @hao={0xc9, 0x10, @private2}, @generic]}, 0x40) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000000200), 0x8) 00:38:38 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000340)=[{&(0x7f0000000000)="8a", 0x1}, {&(0x7f0000000140)='\x00', 0x1}, {&(0x7f0000000380)='/', 0x1}], 0x3, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) 00:38:38 executing program 3: keyctl$clear(0x5, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000080), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$clear(0x7, r0) 00:38:38 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x4e, &(0x7f0000000440)="c4c691019919da078a0098d1e0a593b040f7629100f06ee04fa4ea57ff22ea97be19af3dcba01419cd2386ad59157689c9c6a47312334c2a97ac2b7f0fb4aabebae8dc5dffbcd48a70502173d6ef"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x34) 00:38:38 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0xffffffffffffffff, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6641db6e0551832d303744e57e897094b15ba5d9e70400b1f14712d8ebca47f8b25e7717fd68a8378f362fbf30b8a40a525b7be87baeb12d8e440a49eb252ea2f7fc05d7e532e1a906abffff030000000000008bc3b53e32de099dad2f8fea962d0cbb0f359530f5bc65e8e7d6d01252f603eaab1c436d0a063b76439259a732225fc79e48a4f8f816f99b8189589fb3fbdc4b62b4bdadbebb99bd02b3dc8adee6250b28c8053eb743f17e4197c8223bdca58b3aaa325ea050be1d319c4fba87302d", 0xc2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:38:38 executing program 2: r0 = fork() ptrace(0x10, r0) ptrace(0x8, r0) 00:38:38 executing program 0: sched_setattr(0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000000440)={0x0, 0x12}, &(0x7f0000000040)) r0 = syz_open_dev$usbmon(&(0x7f0000000380), 0x0, 0x0) ioctl$MON_IOCX_GETX(r0, 0x4018920a, &(0x7f0000000100)={0x0, 0x0}) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f0000000080)={0x0, 0x0, 0x5}) read$usbmon(r0, 0x0, 0x0) r1 = getpid() timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) tkill(r1, 0x800000015) 00:38:38 executing program 5: r0 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f0000ee6000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r3, 0x0, 0x0}, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r5 = mmap$IORING_OFF_SQES(&(0x7f00006d8000/0x3000)=nil, 0x3000, 0x0, 0x13, r4, 0x10000000) syz_io_uring_setup(0x7eec, &(0x7f0000000080), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d7000/0x4000)=nil, &(0x7f0000000000), 0x0) syz_io_uring_submit(r1, r5, &(0x7f0000000140)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_uring_enter(r0, 0x4510, 0x0, 0x0, 0x0, 0xf0ffffff) 00:38:38 executing program 4: clone3(&(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000200)=[0xffffffffffffffff], 0x1}, 0x58) clone3(&(0x7f0000000580)={0x156000100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:38:38 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = semget$private(0x0, 0x20000000102, 0x0) r2 = semget$private(0x0, 0x4, 0x0) semop(r2, &(0x7f00000000c0)=[{0x0, 0x0, 0x1000}], 0x1) semop(r1, &(0x7f0000000080)=[{0x0, 0x0, 0x1000}], 0x1) 00:38:38 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "850e32db99baeb0600"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000100)=0xffffffff) r2 = syz_open_pts(r0, 0x0) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) 00:38:38 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0xffffffffffffffff, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6641db6e0551832d303744e57e897094b15ba5d9e70400b1f14712d8ebca47f8b25e7717fd68a8378f362fbf30b8a40a525b7be87baeb12d8e440a49eb252ea2f7fc05d7e532e1a906abffff030000000000008bc3b53e32de099dad2f8fea962d0cbb0f359530f5bc65e8e7d6d01252f603eaab1c436d0a063b76439259a732225fc79e48a4f8f816f99b8189589fb3fbdc4b62b4bdadbebb99bd02b3dc8adee6250b28c8053eb743f17e4197c8223bdca58b3aaa325ea050be1d319c4fba87302d", 0xc2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:38:38 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newsa={0x10c, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@rand_addr=' \x01\x00'}, {@in6=@mcast2, 0x0, 0x2b}, @in6=@private2, {}, {}, {}, 0x0, 0x0, 0xa}, [@encap={0x1c, 0xe, {0x0, 0x0, 0x0, @in6=@ipv4={'\x00', '\xff\xff', @multicast1}}}]}, 0x10c}}, 0x0) 00:38:38 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000340)="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", 0x109}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x5) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x37, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) exit_group(0x0) 00:38:38 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b67, &(0x7f00000005c0)={0x1f00, 0x0, &(0x7f00000001c0)="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"}) ioctl$VT_DISALLOCATE(r0, 0x5608) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000000)) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x20080, 0x0) ioctl$TIOCEXCL(r1, 0x540c) readv(r2, &(0x7f0000000140)=[{&(0x7f0000000080)=""/139, 0x8b}], 0x1) 00:38:38 executing program 4: clone3(&(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000200)=[0xffffffffffffffff], 0x1}, 0x58) clone3(&(0x7f0000000580)={0x156000100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:38:38 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="66530700ae897094e71b0fa1f147a8378f3657cdcf86db93aa6ed9cbc6a9e00b9e626aa995d690c8a2372286677850ab8e9b75839f", 0x35}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x1e) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="02000000010004000000000002000100", @ANYRES32, @ANYBLOB="040004000000000008000400", @ANYRES32, @ANYBLOB="08000500", @ANYRES32, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0xee00, @ANYBLOB="01000000", @ANYRES32, @ANYBLOB="080003"], 0x7c, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 00:38:38 executing program 4: clone3(&(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000200)=[0xffffffffffffffff], 0x1}, 0x58) clone3(&(0x7f0000000580)={0x156000100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:38:39 executing program 0: sched_setattr(0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000000440)={0x0, 0x12}, &(0x7f0000000040)) r0 = syz_open_dev$usbmon(&(0x7f0000000380), 0x0, 0x0) ioctl$MON_IOCX_GETX(r0, 0x4018920a, &(0x7f0000000100)={0x0, 0x0}) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f0000000080)={0x0, 0x0, 0x5}) read$usbmon(r0, 0x0, 0x0) r1 = getpid() timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) tkill(r1, 0x800000015) 00:38:39 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="66530700ae897094e71b0fa1f147a8378f3657cdcf86db93aa6ed9cbc6a9e00b9e626aa995d690c8a2372286677850ab8e9b75839f", 0x35}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x1e) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="02000000010004000000000002000100", @ANYRES32, @ANYBLOB="040004000000000008000400", @ANYRES32, @ANYBLOB="08000500", @ANYRES32, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0xee00, @ANYBLOB="01000000", @ANYRES32, @ANYBLOB="080003"], 0x7c, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 00:38:39 executing program 1: io_setup(0x6, &(0x7f0000000240)=0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000e40)=ANY=[], 0x1378) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r2, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) io_submit(r0, 0x2, &(0x7f0000000100)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000600)="9b", 0x1}, &(0x7f00000005c0)={0x0, 0x0, 0x2, 0x4, 0x0, r3, 0x0}]) 00:38:39 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="66530700ae897094e71b0fa1f147a8378f3657cdcf86db93aa6ed9cbc6a9e00b9e626aa995d690c8a2372286677850ab8e9b75839f", 0x35}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x1e) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="02000000010004000000000002000100", @ANYRES32, @ANYBLOB="040004000000000008000400", @ANYRES32, @ANYBLOB="08000500", @ANYRES32, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0xee00, @ANYBLOB="01000000", @ANYRES32, @ANYBLOB="080003"], 0x7c, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 00:38:39 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000df1000)='./file0/bus\x00', 0x0) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pwrite64(r0, 0x0, 0x0, 0x0) [ 385.503794][ T25] kauditd_printk_skb: 71675 callbacks suppressed [ 385.503935][ T25] audit: type=1326 audit(1619743119.788:2451086): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 385.535465][ T25] audit: type=1326 audit(1619743119.798:2451087): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 385.560196][ T25] audit: type=1326 audit(1619743119.798:2451088): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 385.584689][ T25] audit: type=1326 audit(1619743119.798:2451089): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 385.609112][ T25] audit: type=1326 audit(1619743119.798:2451090): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 385.633464][ T25] audit: type=1326 audit(1619743119.798:2451091): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 385.658064][ T25] audit: type=1326 audit(1619743119.798:2451092): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 385.682566][ T25] audit: type=1326 audit(1619743119.798:2451093): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 385.707075][ T25] audit: type=1326 audit(1619743119.798:2451094): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 385.731788][ T25] audit: type=1326 audit(1619743119.798:2451095): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 00:38:41 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0xffffffffffffffff, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6641db6e0551832d303744e57e897094b15ba5d9e70400b1f14712d8ebca47f8b25e7717fd68a8378f362fbf30b8a40a525b7be87baeb12d8e440a49eb252ea2f7fc05d7e532e1a906abffff030000000000008bc3b53e32de099dad2f8fea962d0cbb0f359530f5bc65e8e7d6d01252f603eaab1c436d0a063b76439259a732225fc79e48a4f8f816f99b8189589fb3fbdc4b62b4bdadbebb99bd02b3dc8adee6250b28c8053eb743f17e4197c8223bdca58b3aaa325ea050be1d319c4fba87302d", 0xc2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:38:41 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000180)="66530700ae897094e71b0fa1f147a8378f3657cdcf86db93aa6ed9cbc6a9e00b9e626aa995d690c8a2372286677850ab8e9b75839f", 0x35}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x1e) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="02000000010004000000000002000100", @ANYRES32, @ANYBLOB="040004000000000008000400", @ANYRES32, @ANYBLOB="08000500", @ANYRES32, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0xee00, @ANYBLOB="01000000", @ANYRES32, @ANYBLOB="080003"], 0x7c, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 00:38:41 executing program 4: r0 = socket$inet(0x2, 0x3, 0xff) setsockopt$inet_mreqsrc(r0, 0x0, 0x1a, 0x0, 0x0) 00:38:41 executing program 1: io_setup(0x6, &(0x7f0000000240)=0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000e40)=ANY=[], 0x1378) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r2, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) io_submit(r0, 0x2, &(0x7f0000000100)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000600)="9b", 0x1}, &(0x7f00000005c0)={0x0, 0x0, 0x2, 0x4, 0x0, r3, 0x0}]) 00:38:41 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000140)="fc0000004a000704ab092500090007000aab80ff0100000000003693e00001", 0x1f) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 00:38:41 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b67, &(0x7f00000005c0)={0x1f00, 0x0, &(0x7f00000001c0)="cdb104f8fd86548ed2c6645d49e1c16ed871faaaee24e0c60e36489d387cb3633e3c0131540d8d4cdac0099c4184a20810030dd061173f82a98bd71c36982cc77dffbf5bd2dccc52a92310966f1727b02208dad39701dc4c2ba44540f4c4684ecc05637058fceb9b0687b82b0d4bd80f7540c511721fa90b7f03331c0acbb693ef180f4bd2060e99f34b9b5a0deeacac1aa2ec216e2fcb52ad4aa0ac67e9fe1f936d92ca52c80f4bd7f2d273bc1c76a81e496a6ef3bbfb80bc8d542efa5758c6d097bc707033b1b7bdf79ba12be7cde7ce67f80148585fe3fc52b41715e1f43d79697aec088fba0a7d8f23c9035fd0c164a778dedec8c3d0441d514dfde070db0c998319e65c7f4daf455f801ce76a71da24150ed8afa8a888c2db62e9b4dffb109483449fb8417dedcfecf6d20dfab33c5756a68674977d1c55f1814e43dd97eadfe47a5af08f33aed0454adb1764a908e9b8df3cf14f7af6b7d9eb18bce4e4c421592ab1c987957af7f7546a14e15dc228e5f460405efeb200cc8baae3b567cfb61a770e8f96ae87c556ad4759bda0dfe323e691ffc4bb1f14308828ba55b660871a1537349a847287578ddf3839a3f59bee1eabce62d6b85b0d2b7df68bf0bad7fbf78055bf41c7693d996f527d912661de67ffc24c2054a3e774ba599f1bb8c6ced3999e4bb38705ee24a5bd25e232faadc89424c00c3ee13e3f20e680955894bc5b11de8a2636a52c6386bbae4f3fe9d7c875fb9bfcfdf5d8dd799ae784a79b27e4aac50d0701eb3fb697442dc33b7ed125544a93f74a830b231d15304e08ca37470df2b5044c08885dacf9de08c07dbec13419b35de5aec842d02fa5366f6c4602c0fe6027ebf062c80ff982f21b0cbf91a6642cc6d27b284c62f861bc1ecbc5267803486e02c0d12da3e9665ef3a6d2510f3a5614ad4721298914ac67c3f07993feb9c3e6c3fae7c88a0506805ba6c80fd9a0836689d6f7b089cbd43f2baec7fb6983ded7167d6c7f4a26020bf4edf405c236e9afa2aa30ba7f3d30eaa936acb06e0d5b3f6cf0fef5626705babea5e83d0365f1f9fd27b1560da4dcb84fc4c40091a46f97fe1055fa5c978f9edfc302b0160d5e47b38bd326bbde817fe7fb5948fc27b258f3989604c44782b6eba09d703d09a80a5ab50255988b81a72db56bdab50e5411866e4d0f82edd794f681a9160fd1c2f9229d55863d1cd5eba14496a41eb36762a2452fe52a3aa1805b857b1eb169a6e9eac7524c7deff592879f515e49e8e21a95bf71fa595dac9d1474714c9b108064c4f4411f718081503ed7212d429f6e05e4f391fc40eebdb44f7bcfb6854d33b99e9de500846eeacba2b4d079d86136fd5d802b62c56b28976810a3273bc78190d8e3081763008ed1c10f65029459e47075f85778133cdd0fcdcd1c3ec232c87a00"}) ioctl$VT_DISALLOCATE(r0, 0x5608) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000000)) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x20080, 0x0) ioctl$TIOCEXCL(r1, 0x540c) readv(r2, &(0x7f0000000140)=[{&(0x7f0000000080)=""/139, 0x8b}], 0x1) 00:38:41 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000040), r0) sendmsg$NLBL_CIPSOV4_C_REMOVE(r1, &(0x7f0000000300)={&(0x7f0000000000), 0xc, &(0x7f00000002c0)={&(0x7f0000000080)={0x20, r2, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_MLSLVLLST={0x4}, @NLBL_CIPSOV4_A_MTYPE={0x8}]}, 0x20}}, 0x0) 00:38:41 executing program 2: getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f00000001c0)={'NETMAP\x00'}, &(0x7f0000000280)=0x1e) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f0000000200)={0x0, 0x0, {0xffffffffffffffff}, 0x8}) write$sndseq(r0, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"a357b6b140cbb6215dd33459"}}], 0xfffffee4) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 00:38:41 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$GIO_UNIMAP(r0, 0x4b66, &(0x7f0000000040)={0x10a, 0x0}) 00:38:41 executing program 1: io_setup(0x6, &(0x7f0000000240)=0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000e40)=ANY=[], 0x1378) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r2, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) io_submit(r0, 0x2, &(0x7f0000000100)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000600)="9b", 0x1}, &(0x7f00000005c0)={0x0, 0x0, 0x2, 0x4, 0x0, r3, 0x0}]) [ 387.644603][T20501] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3 sclass=netlink_route_socket pid=20501 comm=syz-executor.0 00:38:42 executing program 2: getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f00000001c0)={'NETMAP\x00'}, &(0x7f0000000280)=0x1e) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f0000000200)={0x0, 0x0, {0xffffffffffffffff}, 0x8}) write$sndseq(r0, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"a357b6b140cbb6215dd33459"}}], 0xfffffee4) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 00:38:42 executing program 4: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) syz_open_procfs(0x0, 0x0) [ 387.694026][T20501] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=18432 sclass=netlink_route_socket pid=20501 comm=syz-executor.0 00:38:44 executing program 3: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0xffffffffffffffff, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="6641db6e0551832d303744e57e897094b15ba5d9e70400b1f14712d8ebca47f8b25e7717fd68a8378f362fbf30b8a40a525b7be87baeb12d8e440a49eb252ea2f7fc05d7e532e1a906abffff030000000000008bc3b53e32de099dad2f8fea962d0cbb0f359530f5bc65e8e7d6d01252f603eaab1c436d0a063b76439259a732225fc79e48a4f8f816f99b8189589fb3fbdc4b62b4bdadbebb99bd02b3dc8adee6250b28c8053eb743f17e4197c8223bdca58b3aaa325ea050be1d319c4fba87302d", 0xc2}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:38:44 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x140, 0x10, 0x713, 0x0, 0x0, {{@in=@private, @in6=@loopback}, {@in=@broadcast, 0x0, 0x32}, @in=@empty, {0x0, 0x0, 0x0, 0x8}, {}, {}, 0x1, 0x0, 0x2, 0x1}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @tfcpad={0x8}]}, 0x140}}, 0x0) 00:38:44 executing program 2: getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f00000001c0)={'NETMAP\x00'}, &(0x7f0000000280)=0x1e) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f0000000200)={0x0, 0x0, {0xffffffffffffffff}, 0x8}) write$sndseq(r0, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"a357b6b140cbb6215dd33459"}}], 0xfffffee4) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 00:38:44 executing program 1: io_setup(0x6, &(0x7f0000000240)=0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000e40)=ANY=[], 0x1378) r2 = open(&(0x7f0000000400)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x11, r2, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) io_submit(r0, 0x2, &(0x7f0000000100)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000600)="9b", 0x1}, &(0x7f00000005c0)={0x0, 0x0, 0x2, 0x4, 0x0, r3, 0x0}]) 00:38:44 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b67, &(0x7f00000005c0)={0x1f00, 0x0, &(0x7f00000001c0)="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"}) ioctl$VT_DISALLOCATE(r0, 0x5608) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000000)) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x20080, 0x0) ioctl$TIOCEXCL(r1, 0x540c) readv(r2, &(0x7f0000000140)=[{&(0x7f0000000080)=""/139, 0x8b}], 0x1) 00:38:44 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000140)="fc0000004a000704ab092500090007000aab80ff0100000000003693e00001", 0x1f) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) [ 390.513138][ T25] kauditd_printk_skb: 98328 callbacks suppressed [ 390.513221][ T25] audit: type=1326 audit(1619743124.798:2549424): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 00:38:44 executing program 4: r0 = fork() ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) [ 390.594647][ T25] audit: type=1326 audit(1619743124.808:2549425): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 390.643462][ T25] audit: type=1326 audit(1619743124.808:2549426): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 00:38:45 executing program 1: chdir(0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2000005, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendfile(r0, r0, &(0x7f0000000240), 0x0) [ 390.674570][ T25] audit: type=1326 audit(1619743124.808:2549427): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 390.702422][T20562] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3 sclass=netlink_route_socket pid=20562 comm=syz-executor.0 00:38:45 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = getpid() r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0x0, r5) sendmsg$netlink(r2, &(0x7f0000001340)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {r3, 0x0, r5}}}], 0x20}, 0x0) 00:38:45 executing program 2: getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f00000001c0)={'NETMAP\x00'}, &(0x7f0000000280)=0x1e) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f0000000200)={0x0, 0x0, {0xffffffffffffffff}, 0x8}) write$sndseq(r0, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"a357b6b140cbb6215dd33459"}}], 0xfffffee4) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 00:38:45 executing program 1: r0 = socket(0x10, 0x80002, 0x9) sendmsg$NFT_BATCH(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={{0x14}, [], {0x14, 0x3f9}}, 0x28}}, 0x0) [ 390.720128][ T25] audit: type=1326 audit(1619743124.808:2549428): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 390.730069][T20562] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=18432 sclass=netlink_route_socket pid=20562 comm=syz-executor.0 00:38:45 executing program 4: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x109842, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800006, 0x11, r0, 0x0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) ftruncate(r1, 0x2008000) sendmmsg(0xffffffffffffffff, &(0x7f0000002e40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001600)=[{0x10}], 0x10}}], 0x1, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x60000b, 0x9) [ 390.818256][ T25] audit: type=1326 audit(1619743124.808:2549429): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 390.827887][T20579] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=20579 comm=syz-executor.1 [ 390.903287][ T25] audit: type=1326 audit(1619743124.808:2549430): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 390.943171][ T25] audit: type=1326 audit(1619743124.808:2549431): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 390.969031][ T25] audit: type=1326 audit(1619743124.808:2549432): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 390.994260][ T25] audit: type=1326 audit(1619743124.808:2549433): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 00:38:47 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000140)="fc0000004a000704ab092500090007000aab80ff0100000000003693e00001", 0x1f) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) 00:38:47 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="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", 0x107}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1e) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:38:47 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000980)={0x0, 0x4}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) r2 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x800}, {}, 0x0, 0x0, 0x1}, {{@in6=@mcast1, 0x0, 0x32}, 0x0, @in=@broadcast, 0x0, 0x3, 0x0, 0x4, 0xffffffff}}, 0xe8) sendmmsg(r2, &(0x7f0000000480), 0x2e9, 0x1f4) 00:38:47 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890c, &(0x7f0000000000)={@local, @mcast1, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x480003}) 00:38:47 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000300)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, &(0x7f00000025c0), 0x0, &(0x7f00000026c0)) 00:38:47 executing program 5: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b67, &(0x7f00000005c0)={0x1f00, 0x0, &(0x7f00000001c0)="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"}) ioctl$VT_DISALLOCATE(r0, 0x5608) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000000)) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) syz_open_dev$ttys(0xc, 0x2, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040), 0x20080, 0x0) ioctl$TIOCEXCL(r1, 0x540c) readv(r2, &(0x7f0000000140)=[{&(0x7f0000000080)=""/139, 0x8b}], 0x1) 00:38:47 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890c, &(0x7f0000000000)={@local, @mcast1, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x480003}) 00:38:47 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890c, &(0x7f0000000000)={@local, @mcast1, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x480003}) 00:38:47 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x28, r1, 0xb, 0x0, 0x0, {{}, {@void, @val={0xc}}}, [@NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x4}]}, 0x28}}, 0x0) 00:38:48 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000300)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, &(0x7f00000025c0), 0x0, &(0x7f00000026c0)) [ 393.687869][T20623] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3 sclass=netlink_route_socket pid=20623 comm=syz-executor.0 [ 393.722136][T20623] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=18432 sclass=netlink_route_socket pid=20623 comm=syz-executor.0 00:38:48 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890c, &(0x7f0000000000)={@local, @mcast1, @private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x480003}) 00:38:48 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x155, &(0x7f0000000140)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x40) [ 393.761464][T20631] netlink: 'syz-executor.3': attribute type 180 has an invalid length. [ 393.782182][T20636] netlink: 'syz-executor.3': attribute type 180 has an invalid length. 00:38:48 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) socket(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000140)="fc0000004a000704ab092500090007000aab80ff0100000000003693e00001", 0x1f) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r1, 0x0, r3, 0x0, 0x10005, 0x0) [ 394.541451][T20658] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=3 sclass=netlink_route_socket pid=20658 comm=syz-executor.0 [ 394.554611][T20658] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=18432 sclass=netlink_route_socket pid=20658 comm=syz-executor.0 [ 395.522664][ T25] kauditd_printk_skb: 91921 callbacks suppressed [ 395.522675][ T25] audit: type=1326 audit(1619743129.809:2641355): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 395.553547][ T25] audit: type=1326 audit(1619743129.809:2641356): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 395.578603][ T25] audit: type=1326 audit(1619743129.819:2641357): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 395.603528][ T25] audit: type=1326 audit(1619743129.819:2641358): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 395.627973][ T25] audit: type=1326 audit(1619743129.819:2641359): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 395.652342][ T25] audit: type=1326 audit(1619743129.819:2641360): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 395.677040][ T25] audit: type=1326 audit(1619743129.819:2641361): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 395.701545][ T25] audit: type=1326 audit(1619743129.819:2641362): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 395.726033][ T25] audit: type=1326 audit(1619743129.819:2641363): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 395.750678][ T25] audit: type=1326 audit(1619743129.819:2641364): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 00:38:50 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="66530700ae897094e71b0fa1f107000000364603812c66538d750f6ee1d001f43f0500bb9fb045f2d1eaa302ab6c2fef2308003ea1315b9532f3af2f5e153eb78020fa00eb298802d8f6c1f3b18d6d352507f7018b311fef2c560001000000000000fb8005128e7e4d939955f8ac396203784000400f573fbf000000000000000761f35e959f130dec95128ce7ec033dc0a380543bfc99320be1c1bb99bb063fb60935696569eada31b0040015f0332701d9d14a3f9209d666578cc0266bce7860eaaf305a0ee2af0f82a729d5e00d421b0000000000000000949f4f9f000000730428fde6136b8e97c32a552843516ab78c83f85cfe873f70957000dac653b3b313e587cdb091", 0x107}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1e) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:38:50 executing program 4: unshare(0x2c020000) semget$private(0x0, 0x4, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x1, 0x9) semtimedop(0x0, &(0x7f0000000000)=[{0x0, 0x0, 0x1000}], 0x1, 0x0) 00:38:50 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000300)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, &(0x7f00000025c0), 0x0, &(0x7f00000026c0)) 00:38:50 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x155, &(0x7f0000000140)="c4c691019919da078a0098d1e0a593b040f762910000000000000022addee07bee0d6333b5cacd891fa870d434223169b618322ff6602022511253508b5a4496728c2a46e1bc340e29b9ab9b7136283e350808ffdb2dbea7410b36000000007baa17dacdcfac32957dc8bb44e203c4b1bc83d8c0b29f75bcf2e3482945fef116371f8c8c0c4db583a208718e3cccd9dd3bf7a0132044681400bf30024514a6d2675bab926125c43083e773eb3d8dea74700066ee70c42196645292c0e4c3622c102a16be9066fc27e7d4466cbb295eb7f286dcccfde0740cb90366fdd064888fc176574bd977c8c7ef316262a70e75001b11c7c49ae8797518e425ef9080c77c164ad240e88feb024ff8cdd59ea301679ac9655e0bbfa3cd7f00729e4572f401001961318a36c672d3427c660df4544d99987ce9aa5d5c4d40112dc343cb2211c2901a2f8b4a1be407fd745673f70614f7329579c1"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x40) 00:38:50 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) write(r3, &(0x7f0000000080)="1f0000000104ff00fd4354c007110000f30501000800017f16c6d23d371779", 0x10001) socket$nl_netfilter(0x10, 0x3, 0xc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x0) 00:38:50 executing program 0: syz_mount_image$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) fstat(r0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xee00, r1) listxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 00:38:50 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x155, &(0x7f0000000140)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x40) 00:38:50 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) io_setup(0x5, &(0x7f0000000040)=0x0) io_submit(r1, 0x1, &(0x7f0000000500)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f00000000c0)="47e1368bbfca59d40ee277eeceda4468f0841fc241ecf5b388788d67067a45b9927a346e935651273b11aaf3932e06221bb5dc20710114538b5c660c19bcd23719acbda5ab3bdd71828ae9fbf55d695933e9a499da52d7e6be31472f41d4119cab9b58", 0x63}]) 00:38:50 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = add_key$keyring(&(0x7f0000000300), &(0x7f0000000340)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f00000002c0)='user\x00', &(0x7f0000001000), &(0x7f0000001000)='.', 0x1, r1) 00:38:51 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000300)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) syz_mount_image$nfs4(&(0x7f00000000c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, &(0x7f00000025c0), 0x0, &(0x7f00000026c0)) [ 396.712705][T20682] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.5'. 00:38:51 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) write(r3, &(0x7f0000000080)="1f0000000104ff00fd4354c007110000f30501000800017f16c6d23d371779", 0x10001) socket$nl_netfilter(0x10, 0x3, 0xc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x0) 00:38:51 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = add_key$keyring(&(0x7f0000000300), &(0x7f0000000340)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f00000002c0)='user\x00', &(0x7f0000001000), &(0x7f0000001000)='.', 0x1, r1) [ 396.886254][T20712] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.5'. 00:38:53 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="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", 0x107}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1e) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:38:53 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x14}, {0x6, 0x0, 0x0, 0x7fff0000}]}) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) 00:38:53 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x155, &(0x7f0000000140)="c4c691019919da078a0098d1e0a593b040f762910000000000000022addee07bee0d6333b5cacd891fa870d434223169b618322ff6602022511253508b5a4496728c2a46e1bc340e29b9ab9b7136283e350808ffdb2dbea7410b36000000007baa17dacdcfac32957dc8bb44e203c4b1bc83d8c0b29f75bcf2e3482945fef116371f8c8c0c4db583a208718e3cccd9dd3bf7a0132044681400bf30024514a6d2675bab926125c43083e773eb3d8dea74700066ee70c42196645292c0e4c3622c102a16be9066fc27e7d4466cbb295eb7f286dcccfde0740cb90366fdd064888fc176574bd977c8c7ef316262a70e75001b11c7c49ae8797518e425ef9080c77c164ad240e88feb024ff8cdd59ea301679ac9655e0bbfa3cd7f00729e4572f401001961318a36c672d3427c660df4544d99987ce9aa5d5c4d40112dc343cb2211c2901a2f8b4a1be407fd745673f70614f7329579c1"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x40) 00:38:53 executing program 2: set_mempolicy(0x8001, &(0x7f0000000140)=0xee99, 0x6006) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x5609, &(0x7f0000000000)={0x2, {0x3}}) 00:38:53 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = add_key$keyring(&(0x7f0000000300), &(0x7f0000000340)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f00000002c0)='user\x00', &(0x7f0000001000), &(0x7f0000001000)='.', 0x1, r1) 00:38:53 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) write(r3, &(0x7f0000000080)="1f0000000104ff00fd4354c007110000f30501000800017f16c6d23d371779", 0x10001) socket$nl_netfilter(0x10, 0x3, 0xc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x0) 00:38:53 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = add_key$keyring(&(0x7f0000000300), &(0x7f0000000340)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f00000002c0)='user\x00', &(0x7f0000001000), &(0x7f0000001000)='.', 0x1, r1) 00:38:53 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$sock(r0, &(0x7f0000000840)=[{{&(0x7f0000000240)=@in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x3c}}, 0x80, &(0x7f0000000640)=[{&(0x7f00000003c0)="6f19b560b761d4976cfc48f6e742f638a89b0e39176c22cd5a90025f7b1db429c52a38aa5635c9c894e9d08d8dd40e5e1764c2d218d6ae761e475af6bd3c57f3a02127b103a69814738ae7581093c5a05ba8f9f68333b64020b2", 0x5a}, {&(0x7f0000000440)="fcbaa1894c279271ff33752e383cea0a", 0x10}, {&(0x7f0000000480)="8de051927fb00666a98dd7e7bec793d6f67cbcc887e3cea2a64f254a4752a0964609f2e77e82b144a0cd6c018d4a372ee29c4553e2a8a8b742a3b91e6097b4c04e81ee585d9e23a856dbbe7466be239fe16affc200be280c931770304a1970c7d7911fecf62ceee5f32a29463b9ee0356e95601b58a696817e0a9b21ba83dfe0bfa0580bde408c9e208d871ff717e2ca7343", 0x92}, {0x0}], 0x4}}], 0x1, 0x0) 00:38:54 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x14}, {0x6, 0x0, 0x0, 0x7fff0000}]}) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) 00:38:54 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x14}, {0x6, 0x0, 0x0, 0x7fff0000}]}) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) [ 399.707930][T20737] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.5'. 00:38:54 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='environ\x00') preadv(r1, &(0x7f0000001400)=[{&(0x7f0000000040)=""/113, 0x200000b1}], 0x1, 0x0, 0x0) 00:38:54 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000040)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @private2}}}, 0x108) [ 400.532268][ T25] kauditd_printk_skb: 95054 callbacks suppressed [ 400.532279][ T25] audit: type=1326 audit(1619743134.819:2736419): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 400.563542][ T25] audit: type=1326 audit(1619743134.829:2736420): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 400.588753][ T25] audit: type=1326 audit(1619743134.829:2736421): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 400.613394][ T25] audit: type=1326 audit(1619743134.829:2736422): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 400.638535][ T25] audit: type=1326 audit(1619743134.829:2736423): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 400.669714][ T25] audit: type=1326 audit(1619743134.829:2736424): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 400.694088][ T25] audit: type=1326 audit(1619743134.829:2736425): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 400.718513][ T25] audit: type=1326 audit(1619743134.829:2736426): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 400.742922][ T25] audit: type=1326 audit(1619743134.829:2736427): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 400.767521][ T25] audit: type=1326 audit(1619743134.829:2736428): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 00:38:56 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="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", 0x107}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1e) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:38:56 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x14}, {0x6, 0x0, 0x0, 0x7fff0000}]}) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) 00:38:56 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) close(r4) write(r3, &(0x7f0000000080)="1f0000000104ff00fd4354c007110000f30501000800017f16c6d23d371779", 0x10001) socket$nl_netfilter(0x10, 0x3, 0xc) splice(r2, 0x0, r4, 0x0, 0x4ffe0, 0x0) 00:38:56 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x14}, {0x6, 0x0, 0x0, 0x7fff0000}]}) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) 00:38:56 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='environ\x00') preadv(r1, &(0x7f0000001400)=[{&(0x7f0000000040)=""/113, 0x200000b1}], 0x1, 0x0, 0x0) 00:38:56 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001940)={0x88, 0x0, 0x2, 0x401, 0x0, 0x0, {0x2}, [@CTA_EXPECT_TUPLE={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_EXPECT_MASK={0x24, 0x3, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_EXPECT_MASTER={0x2c, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @local}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}]}, 0x88}}, 0x0) 00:38:56 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x14}, {0x6, 0x0, 0x0, 0x7fff0000}]}) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) 00:38:56 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='environ\x00') preadv(r1, &(0x7f0000001400)=[{&(0x7f0000000040)=""/113, 0x200000b1}], 0x1, 0x0, 0x0) 00:38:56 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net\x00') fchdir(r0) 00:38:56 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x14}, {0x6, 0x0, 0x0, 0x7fff0000}]}) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) 00:38:57 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x127b, 0x541000) 00:38:57 executing program 3: mkdir(&(0x7f0000000140)='./control\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000100)='./control\x00', &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f00000001c0), 0x24, 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) getgroups(0x2, &(0x7f0000000040)=[0xee00, 0xee01]) chown(&(0x7f0000000080)='./control\x00', 0xee00, r0) open(&(0x7f00000002c0)='./control\x00', 0x0, 0x0) [ 402.716268][T20785] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.5'. [ 405.541741][ T25] kauditd_printk_skb: 100363 callbacks suppressed [ 405.541793][ T25] audit: type=1326 audit(1619743139.830:2836792): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 405.573123][ T25] audit: type=1326 audit(1619743139.840:2836793): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 405.597791][ T25] audit: type=1326 audit(1619743139.840:2836794): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 00:38:59 executing program 5: futex(&(0x7f0000000000), 0x5, 0x0, 0x0, &(0x7f0000000040), 0x80000003) 00:38:59 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='environ\x00') preadv(r1, &(0x7f0000001400)=[{&(0x7f0000000040)=""/113, 0x200000b1}], 0x1, 0x0, 0x0) 00:38:59 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f00000004c0)={@in={{0x2, 0x0, @loopback}}, 0x0, 0x0, 0x7, 0x0, "98d3340600c7aa11897ecaab876eab79576839c5656be8410f2802e944af80373be2666b665770173fbd1883303b6ac4749393ad08f139a68f00"}, 0xd8) bind$inet(r1, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) r2 = socket(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="4c0000001000fff1fefefd956f76c9b724a6008000000000000000683440150024001b0000000000000000593ab782115ed9043d51d7e88dc62b2ca654a6613b6a080000001cbc882b079881", 0x4c}], 0x1}, 0x0) write$binfmt_elf64(r1, &(0x7f00000000c0)=ANY=[@ANYRESHEX], 0xc63b9e35) 00:38:59 executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r0]) accept$unix(r0, 0x0, 0x0) shutdown(r0, 0x0) 00:38:59 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x19e}) 00:38:59 executing program 1: prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) [ 405.622520][ T25] audit: type=1326 audit(1619743139.840:2836795): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 405.647232][ T25] audit: type=1326 audit(1619743139.840:2836796): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 405.677078][T20815] netlink: 'syz-executor.3': attribute type 27 has an invalid length. 00:39:00 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x5}]}, 0x10) 00:39:00 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000100), 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='reno\x00', 0x5) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x1000001bd) 00:39:00 executing program 1: r0 = fork() timer_create(0x0, &(0x7f0000000a40)={0x0, 0x0, 0x4, @tid=r0}, 0x0) [ 405.685384][T20815] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:39:00 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x402) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x3, 0x0) 00:39:00 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x19e}) [ 405.732047][ T25] audit: type=1326 audit(1619743139.840:2836797): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 00:39:00 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) rmdir(&(0x7f0000000200)='./file0\x00') mount(&(0x7f0000000080), &(0x7f0000000140)='.', 0x0, 0x5110, 0x0) 00:39:00 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x19e}) 00:39:00 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r1 = socket(0x400000000000010, 0x802, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$sock_int(r0, 0x1, 0x2d, &(0x7f0000000080)=0x3, 0x4) 00:39:00 executing program 3: setuid(0xee00) socket$inet_icmp_raw(0x2, 0x3, 0x1) [ 405.773791][T20832] program syz-executor.3 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 405.833609][ T25] audit: type=1326 audit(1619743139.840:2836798): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 405.870309][ T25] audit: type=1326 audit(1619743139.840:2836799): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 405.895357][ T25] audit: type=1326 audit(1619743139.840:2836800): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 405.920389][ T25] audit: type=1326 audit(1619743139.840:2836801): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 00:39:00 executing program 4: r0 = socket(0x2, 0x3, 0x5) sendmsg$inet(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000100)=[@ip_retopts={{0x14, 0x0, 0x7, {[@generic={0x82, 0x2}, @noop]}}}], 0x18}, 0x0) 00:39:00 executing program 1: r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x0, 0x0) ioctl$LOOP_SET_FD(r0, 0x1261, 0xffffffffffffffff) 00:39:00 executing program 3: perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x404, 0x0, 0x0, 0x0, 0x206}}], 0x1, 0x0, 0x0) epoll_create1(0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/netlink\x00') preadv(r0, &(0x7f00000017c0), 0x2e1, 0x0, 0x0) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000240)=[{&(0x7f0000000000)="4c0000001200ff09ff3a150099a283ff07b8008000f0ffff000000060040150024001d001fc411a0b598bc593ab6821148a730cc33a49868c62b2ca654a6613b6aab", 0x42}, {&(0x7f0000000440)="0baba02e95c8c0408265", 0xa}], 0x2}, 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000080)=@add_del={0x2, &(0x7f0000000040)='nr0\x00'}) 00:39:00 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp\x00') preadv(r0, &(0x7f0000001380)=[{&(0x7f0000000040)=""/4082, 0xff2}], 0x1, 0x3c, 0x0) [ 406.555015][T20865] netlink: 'syz-executor.3': attribute type 29 has an invalid length. [ 406.563345][T20865] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 406.592433][T20865] netlink: 'syz-executor.3': attribute type 29 has an invalid length. 00:39:00 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0xffffffffffffffff, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="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", 0x115}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 00:39:00 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r0, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x19e}) 00:39:00 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x87, 0x2}]}) 00:39:00 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000100), 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='reno\x00', 0x5) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x1000001bd) 00:39:00 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000010100)="000000090000000000000000c20d000000000000000000b8017737c54836ecaaf8ffff00f0ff", 0x26, 0x1e0}, {&(0x7f0000000180)="53595a4b414c4c45522020080000e780325132510000e780325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000c1e770325132510000e770325103", 0x5b, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='check=strict,iocharset=cp437']) openat(r1, &(0x7f0000000200)='./file0/file1\x00', 0x0, 0x0) mknodat(r1, &(0x7f0000000080)='./file0/file1\x00', 0x0, 0x0) 00:39:00 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0xffffffffffffffff, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="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", 0x115}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 406.600887][T20865] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:39:00 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) set_mempolicy(0x1, &(0x7f0000000080)=0x9, 0x3) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x3}, 0x4) [ 406.646646][T20875] netlink: 'syz-executor.3': attribute type 29 has an invalid length. [ 406.654874][T20875] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 406.666706][T20887] loop5: detected capacity change from 0 to 270 [ 406.667053][T20875] netlink: 'syz-executor.3': attribute type 29 has an invalid length. [ 406.682274][T20875] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:39:01 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0xffffffffffffffff, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="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", 0x115}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 00:39:01 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000380)="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", 0x102}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 00:39:01 executing program 4: r0 = syz_io_uring_setup(0x3ede, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = dup(r3) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_POLL_ADD={0x6, 0x2, 0x0, @fd_index=0x5}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000001380)=@in6={0xa, 0x0, 0x0, @private0}, 0x80, 0x0}}], 0x1, 0x0) io_uring_enter(r0, 0x2ff, 0x0, 0x0, 0x0, 0x0) shutdown(r3, 0x1) ppoll(&(0x7f0000000040)=[{r4}], 0x1, 0x0, 0x0, 0x0) shutdown(r4, 0x0) 00:39:01 executing program 3: perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x404, 0x0, 0x0, 0x0, 0x206}}], 0x1, 0x0, 0x0) epoll_create1(0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/netlink\x00') preadv(r0, &(0x7f00000017c0), 0x2e1, 0x0, 0x0) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000240)=[{&(0x7f0000000000)="4c0000001200ff09ff3a150099a283ff07b8008000f0ffff000000060040150024001d001fc411a0b598bc593ab6821148a730cc33a49868c62b2ca654a6613b6aab", 0x42}, {&(0x7f0000000440)="0baba02e95c8c0408265", 0xa}], 0x2}, 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000080)=@add_del={0x2, &(0x7f0000000040)='nr0\x00'}) [ 406.712623][T20887] FAT-fs (loop5): error, corrupted directory (invalid entries) [ 406.720322][T20887] FAT-fs (loop5): Filesystem has been set read-only 00:39:01 executing program 2: perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x404, 0x0, 0x0, 0x0, 0x206}}], 0x1, 0x0, 0x0) epoll_create1(0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/netlink\x00') preadv(r0, &(0x7f00000017c0), 0x2e1, 0x0, 0x0) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000240)=[{&(0x7f0000000000)="4c0000001200ff09ff3a150099a283ff07b8008000f0ffff000000060040150024001d001fc411a0b598bc593ab6821148a730cc33a49868c62b2ca654a6613b6aab", 0x42}, {&(0x7f0000000440)="0baba02e95c8c0408265", 0xa}], 0x2}, 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000080)=@add_del={0x2, &(0x7f0000000040)='nr0\x00'}) 00:39:01 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0xffffffffffffffff, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="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", 0x115}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 406.776912][T20907] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 406.789326][T20906] netlink: 'syz-executor.3': attribute type 29 has an invalid length. [ 406.797626][T20906] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:39:01 executing program 1: r0 = socket$inet(0x2, 0x3, 0x2) r1 = socket$inet_tcp(0x2, 0x1, 0x0) fstat(r1, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, r2) setsockopt$inet_int(r0, 0x0, 0xca, 0x0, 0x0) 00:39:01 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000010100)="000000090000000000000000c20d000000000000000000b8017737c54836ecaaf8ffff00f0ff", 0x26, 0x1e0}, {&(0x7f0000000180)="53595a4b414c4c45522020080000e780325132510000e780325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000c1e770325132510000e770325103", 0x5b, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='check=strict,iocharset=cp437']) openat(r1, &(0x7f0000000200)='./file0/file1\x00', 0x0, 0x0) mknodat(r1, &(0x7f0000000080)='./file0/file1\x00', 0x0, 0x0) [ 406.871731][T20906] netlink: 'syz-executor.3': attribute type 29 has an invalid length. [ 406.875238][T20923] netlink: 'syz-executor.2': attribute type 29 has an invalid length. [ 406.880025][T20906] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. [ 406.897554][T20923] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 406.965667][T20923] netlink: 'syz-executor.2': attribute type 29 has an invalid length. [ 406.974086][T20923] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 406.988215][T20940] loop5: detected capacity change from 0 to 270 [ 407.012477][T20940] FAT-fs (loop5): error, corrupted directory (invalid entries) [ 407.020211][T20940] FAT-fs (loop5): Filesystem has been set read-only [ 407.060389][T20947] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) 00:39:01 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000100), 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='reno\x00', 0x5) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x1000001bd) 00:39:01 executing program 3: perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x404, 0x0, 0x0, 0x0, 0x206}}], 0x1, 0x0, 0x0) epoll_create1(0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/netlink\x00') preadv(r0, &(0x7f00000017c0), 0x2e1, 0x0, 0x0) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000240)=[{&(0x7f0000000000)="4c0000001200ff09ff3a150099a283ff07b8008000f0ffff000000060040150024001d001fc411a0b598bc593ab6821148a730cc33a49868c62b2ca654a6613b6aab", 0x42}, {&(0x7f0000000440)="0baba02e95c8c0408265", 0xa}], 0x2}, 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000080)=@add_del={0x2, &(0x7f0000000040)='nr0\x00'}) 00:39:01 executing program 4: r0 = syz_io_uring_setup(0x70c4, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000400000/0xc00000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_RECVMSG={0xa, 0x4, 0x0, r4, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000000c0)=@IORING_OP_TEE={0x21, 0x2, 0x0, @fd=r4, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, r3}}, 0xdf24) io_uring_enter(r0, 0x4aa3, 0x0, 0x0, 0x0, 0x0) 00:39:01 executing program 1: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000006e00), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_NEW_INTERFACE(r1, &(0x7f0000007740)={0x0, 0x0, &(0x7f0000007700)={&(0x7f00000013c0)={0x2c, r0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0x8}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x3, 0x1}]}, 0x2c}}, 0x0) 00:39:01 executing program 2: perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x404, 0x0, 0x0, 0x0, 0x206}}], 0x1, 0x0, 0x0) epoll_create1(0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/netlink\x00') preadv(r0, &(0x7f00000017c0), 0x2e1, 0x0, 0x0) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000240)=[{&(0x7f0000000000)="4c0000001200ff09ff3a150099a283ff07b8008000f0ffff000000060040150024001d001fc411a0b598bc593ab6821148a730cc33a49868c62b2ca654a6613b6aab", 0x42}, {&(0x7f0000000440)="0baba02e95c8c0408265", 0xa}], 0x2}, 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000080)=@add_del={0x2, &(0x7f0000000040)='nr0\x00'}) 00:39:01 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000010100)="000000090000000000000000c20d000000000000000000b8017737c54836ecaaf8ffff00f0ff", 0x26, 0x1e0}, {&(0x7f0000000180)="53595a4b414c4c45522020080000e780325132510000e780325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000c1e770325132510000e770325103", 0x5b, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='check=strict,iocharset=cp437']) openat(r1, &(0x7f0000000200)='./file0/file1\x00', 0x0, 0x0) mknodat(r1, &(0x7f0000000080)='./file0/file1\x00', 0x0, 0x0) [ 407.498222][T20959] loop5: detected capacity change from 0 to 270 [ 407.518060][T20959] FAT-fs (loop5): error, corrupted directory (invalid entries) [ 407.525674][T20959] FAT-fs (loop5): Filesystem has been set read-only [ 407.539228][T20959] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) 00:39:01 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000280)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000010100)="000000090000000000000000c20d000000000000000000b8017737c54836ecaaf8ffff00f0ff", 0x26, 0x1e0}, {&(0x7f0000000180)="53595a4b414c4c45522020080000e780325132510000e780325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000c1e770325132510000e770325103", 0x5b, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='check=strict,iocharset=cp437']) openat(r1, &(0x7f0000000200)='./file0/file1\x00', 0x0, 0x0) mknodat(r1, &(0x7f0000000080)='./file0/file1\x00', 0x0, 0x0) 00:39:01 executing program 3: perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x404, 0x0, 0x0, 0x0, 0x206}}], 0x1, 0x0, 0x0) epoll_create1(0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/netlink\x00') preadv(r0, &(0x7f00000017c0), 0x2e1, 0x0, 0x0) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000240)=[{&(0x7f0000000000)="4c0000001200ff09ff3a150099a283ff07b8008000f0ffff000000060040150024001d001fc411a0b598bc593ab6821148a730cc33a49868c62b2ca654a6613b6aab", 0x42}, {&(0x7f0000000440)="0baba02e95c8c0408265", 0xa}], 0x2}, 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000080)=@add_del={0x2, &(0x7f0000000040)='nr0\x00'}) 00:39:01 executing program 1: mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x0, 0x0) munmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000) mlock2(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0) 00:39:01 executing program 4: r0 = memfd_create(&(0x7f0000000640)='\x06\n\x00\xfd\xbe\x00t\xc6m4Hx\n\xed\x19\x01\xbe\x14\xb5\n>\xddW\x14\xd1\xc3\xe1S\xb5\x95w\xb5\x96Mk\xc5*}\x81\xfac\n\xbf\x16\x82\xa3\x99LO%\x9cC\x9f\x1b\xcb\'\xa0\xeb\xc04\x97d\xf2\x93\xf5J\x95\x8a\x15\x02\xf4\xd3\x03\xa6\xe9\xbf\xe4H\x10\xb3JT\xf2]\xa1\xf9\xb6\x9c\xdd\xbaVI6/\xa8G%\x88\xc2\xad\xebY\xef\xdf\xdcu{\x05EN\xd77$\xc1\x009\xabK\xa9\xf9\xc0>(\x9cjR\x0e*\xed\x9fVH\x1f\x8dr\xbe\r0\xff\xa5yA\x03\x02\xb8\xba8\xb0\x8a\x98(\xb2+4\x85\xfb\xc5fu\xb7\xae\x01n\xa5\xc4\xe4\xd8*ZY\xf9Bg9Yu\xb2\xd1\xb5s+\x14\xbd\x05\xdaw\xa4\xbb\x90e\xc0\x92', 0x0) ftruncate(r0, 0x1000000) ftruncate(r0, 0x0) [ 407.547876][T20965] netlink: 'syz-executor.2': attribute type 29 has an invalid length. 00:39:01 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x35, &(0x7f0000005d80)=0x80, 0x4) recvmsg(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 00:39:01 executing program 2: perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x404, 0x0, 0x0, 0x0, 0x206}}], 0x1, 0x0, 0x0) epoll_create1(0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/netlink\x00') preadv(r0, &(0x7f00000017c0), 0x2e1, 0x0, 0x0) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000240)=[{&(0x7f0000000000)="4c0000001200ff09ff3a150099a283ff07b8008000f0ffff000000060040150024001d001fc411a0b598bc593ab6821148a730cc33a49868c62b2ca654a6613b6aab", 0x42}, {&(0x7f0000000440)="0baba02e95c8c0408265", 0xa}], 0x2}, 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000080)=@add_del={0x2, &(0x7f0000000040)='nr0\x00'}) [ 407.631755][T20982] loop5: detected capacity change from 0 to 270 [ 407.687447][T20982] FAT-fs (loop5): error, corrupted directory (invalid entries) [ 407.695069][T20982] FAT-fs (loop5): Filesystem has been set read-only [ 407.733193][T20999] __nla_validate_parse: 6 callbacks suppressed [ 407.733219][T20999] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 407.754685][T21002] FAT-fs (loop5): error, fat_get_cluster: invalid cluster chain (i_pos 0) [ 407.761607][T20999] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 00:39:02 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000005c0)=0x169, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000000040)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000100), 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='reno\x00', 0x5) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x1000001bd) 00:39:02 executing program 1: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="66530700ae897094e71b0fb1f14701ffffffffffffff66538d750f6ee1d001093f136318ffd6caefe5a73f0500ab783c7d5dbb9fb245f2d1eaa3ca203640e3e1c7f9cf6d2223d569b6fe53fd32283d7628e90f21c8c43e99720ed72373a3e96ccd9a517752e54a9776e8d92c8cca06f571199725b26547f8ff103ad731ab11da4b049fbb92ea50d088afd1623da1e522b7a3db2efa30800df7a38f4922d714402c23b311c95965111b", 0xa9}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0xfffffffffffffffe, 0x0) 00:39:02 executing program 4: r0 = syz_io_uring_setup(0x6b50, &(0x7f0000000080)={0x0, 0x0, 0x2}, &(0x7f0000000000/0x11000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000000), &(0x7f0000000040)) io_uring_enter(r0, 0x3f3, 0x0, 0x9, 0x0, 0x18) 00:39:02 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000280)="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", 0x107}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 00:39:02 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x800500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)={'trans=tcp,', {}, 0x2c, {[{@noextend}]}}) 00:39:02 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000013a00)) mount(0x0, &(0x7f0000001240)='./file0\x00', 0x0, 0x2021, 0x0) 00:39:02 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f00000000c0)="580000001400ad", 0x7}], 0x1) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[], 0xa) close(r2) socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000600)=[{&(0x7f0000000380)="f98ac693ce6908", 0x7}], 0x1) writev(0xffffffffffffffff, &(0x7f0000fdbff8)=[{&(0x7f0000000180)="290000002100190000003fffffffda260200000000e80001040000040d0014", 0x1f}], 0x1) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0xfef0) splice(r0, 0x0, r2, 0x0, 0x80000001, 0x0) 00:39:02 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setattr(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) setregid(0x0, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0xee01) 00:39:02 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f00000015c0)={0x0, 0x0, &(0x7f0000001580)={&(0x7f00000000c0)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4, 0x2}]}]}, 0x1c}}, 0x0) [ 408.382730][T21015] 9pnet: p9_fd_create_tcp (21015): problem connecting socket to 127.0.0.1 [ 408.394270][T21030] loop2: detected capacity change from 0 to 512 [ 408.441839][T21030] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 00:39:02 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x8936, &(0x7f0000000040)={@loopback, @private2, @dev}) 00:39:02 executing program 3: r0 = socket$inet(0x10, 0x80002, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="240000001a0007041dfffd946f6105000a0000e8fe020801000108000800030012000000280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 00:39:02 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)) fcntl$notify(r0, 0x402, 0xb1c661d318500c51) r1 = syz_open_procfs(0x0, &(0x7f0000000040)) fcntl$notify(r1, 0x402, 0xb1c661d318500c51) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = syz_open_procfs(0x0, &(0x7f0000000040)) fcntl$notify(r2, 0x402, 0x0) [ 408.483396][T21030] EXT4-fs (loop2): re-mounted. Opts: (null). Quota mode: none. [ 408.558882][T21058] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:39:03 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x9, 0x3ff, 0x3ff}) 00:39:03 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000140)=ANY=[@ANYBLOB="e0000001ac1414aa0000000003"], 0x1c) setsockopt$inet_mreqn(r0, 0x0, 0x26, &(0x7f0000000080)={@multicast1, @local}, 0xc) 00:39:03 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f00000015c0)={0x0, 0x0, &(0x7f0000001580)={&(0x7f00000000c0)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4, 0x2}]}]}, 0x1c}}, 0x0) 00:39:03 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) sendmsg$sock(r0, &(0x7f0000000480)={&(0x7f0000000240)=@hci={0x1f, 0x0, 0x1}, 0x80, 0x0, 0x0, &(0x7f00000003c0)=[@mark={{0x14, 0x1, 0x2}}, @mark={{0x14}}], 0x30}, 0x0) 00:39:03 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') lseek(r0, 0x35c, 0x0) 00:39:03 executing program 5: r0 = syz_open_dev$rtc(&(0x7f0000000600), 0x0, 0x0) ioctl$RTC_IRQP_READ(r0, 0x8008700b, 0x0) 00:39:03 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f00000015c0)={0x0, 0x0, &(0x7f0000001580)={&(0x7f00000000c0)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4, 0x2}]}]}, 0x1c}}, 0x0) 00:39:03 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket(0x400000000000010, 0x802, 0x0) write(0xffffffffffffffff, 0x0, 0x0) fallocate(r0, 0x0, 0x800, 0x0) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 00:39:03 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = memfd_create(&(0x7f0000000000)='\x9d#\x00\xe6Z\x00\x8fq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\x7f\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x00\x00\x00\x00\xa1\xa2\xe0g\x98', 0x0) fallocate(r1, 0x0, 0x0, 0x400004) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) r2 = getpid() tkill(r2, 0x2d) [ 409.211232][T21076] EXT4-fs warning (device sda1): ext4_group_add:1667: No reserved GDT blocks, can't resize 00:39:03 executing program 3: r0 = socket$unix(0xa, 0x1, 0x0) setrlimit(0x7, &(0x7f0000000300)) accept4$unix(r0, 0x0, 0x0, 0x0) 00:39:03 executing program 4: r0 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) r1 = syz_io_uring_setup(0x87, &(0x7f0000000a80), &(0x7f0000ee7000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000002240)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd=r0}, 0x0) r4 = signalfd4(0xffffffffffffffff, &(0x7f0000006000), 0x8, 0x0) r5 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r4, &(0x7f0000000900)) io_uring_enter(r1, 0x450c, 0x0, 0x0, 0x0, 0x0) r6 = signalfd4(0xffffffffffffffff, &(0x7f0000006000), 0x8, 0x0) r7 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r7, 0x1, r6, &(0x7f0000000900)) signalfd4(r0, &(0x7f0000000140), 0x8, 0x0) 00:39:03 executing program 5: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockname(r0, 0x0, &(0x7f0000000080)=0x10) 00:39:03 executing program 2: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000b40), 0xffffffffffffffff) set_mempolicy(0x1, &(0x7f0000000000)=0x9, 0xbc9) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_DEL_PMKSA(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000300)={0x28, r0, 0x1, 0x0, 0x0, {{0x7e}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) 00:39:03 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = memfd_create(&(0x7f0000000000)='\x9d#\x00\xe6Z\x00\x8fq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\x7f\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x00\x00\x00\x00\xa1\xa2\xe0g\x98', 0x0) fallocate(r1, 0x0, 0x0, 0x400004) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) r2 = getpid() tkill(r2, 0x2d) 00:39:03 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=[@rights={{0x14, 0x1, 0x1, [r0]}}], 0x18}, 0x0) recvfrom$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 00:39:03 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f00000015c0)={0x0, 0x0, &(0x7f0000001580)={&(0x7f00000000c0)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x4, 0x2}]}]}, 0x1c}}, 0x0) 00:39:03 executing program 4: mq_open(&(0x7f0000000100)='\xdc<$+]{\x00', 0x0, 0x0, 0x0) 00:39:03 executing program 5: mkdir(&(0x7f0000000640)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') mount(0x0, &(0x7f0000002b00)='./file0\x00', &(0x7f0000002b40)='binfmt_misc\x00', 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000180)) epoll_wait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0) 00:39:03 executing program 3: io_uring_setup(0x44ed0, &(0x7f0000000080)={0x0, 0x10007d78, 0x19}) [ 409.370417][T21113] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 00:39:03 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = memfd_create(&(0x7f0000000000)='\x9d#\x00\xe6Z\x00\x8fq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\x7f\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x00\x00\x00\x00\xa1\xa2\xe0g\x98', 0x0) fallocate(r1, 0x0, 0x0, 0x400004) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) r2 = getpid() tkill(r2, 0x2d) 00:39:03 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, r0, 0x0) 00:39:03 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0003}]}) setreuid(0x0, 0x0) 00:39:03 executing program 2: creat(&(0x7f00000001c0)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$tmpfs(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f00000000c0)={[{@mpol={'mpol', 0x3d, {'prefer', '', @val={0x3a, [0x36]}}}, 0x63}]}) 00:39:03 executing program 3: io_uring_setup(0x44ed0, &(0x7f0000000080)={0x0, 0x10007d78, 0x19}) 00:39:03 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000004c0), r0) sendmsg$NLBL_UNLABEL_C_STATICADD(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={&(0x7f0000000800)={0x54, r1, 0x501, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'erspan0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x2a, 0x7, 'system_u:object_r:tmpreaper_exec_t:s0\x00'}]}, 0x54}}, 0x0) 00:39:03 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06000000010000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) close(r1) 00:39:03 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = memfd_create(&(0x7f0000000000)='\x9d#\x00\xe6Z\x00\x8fq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\x7f\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x00\x00\x00\x00\xa1\xa2\xe0g\x98', 0x0) fallocate(r1, 0x0, 0x0, 0x400004) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) r2 = getpid() tkill(r2, 0x2d) 00:39:03 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl(r0, 0x80009375, &(0x7f00000002c0)="0100000000000000180100000500000300000000000000002f") 00:39:03 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0003}]}) setreuid(0x0, 0x0) [ 409.532408][T21142] tmpfs: Bad value for 'mpol' [ 409.552396][T21151] tmpfs: Bad value for 'mpol' 00:39:03 executing program 3: io_uring_setup(0x44ed0, &(0x7f0000000080)={0x0, 0x10007d78, 0x19}) 00:39:03 executing program 5: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000280)={0x6}, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)={0x1c, 0x1a, 0x1, 0x0, 0x0, {0xa}, [@generic="9e00003bbd"]}, 0x1c}}, 0x0) 00:39:03 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06000000010000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) close(r1) 00:39:03 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/79, 0x4f}, {&(0x7f0000000040)=""/42, 0xff6e}, {&(0x7f0000000180)=""/30, 0x2a}], 0x3, 0xd9f, 0x0) r1 = socket(0xa, 0x3, 0x40) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000080)=@abs, 0x6e) 00:39:03 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0003}]}) setreuid(0x0, 0x0) 00:39:03 executing program 2: syz_mount_image$msdos(&(0x7f0000000380), &(0x7f00000008c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000fc0), 0x0, &(0x7f0000001040)=ANY=[@ANYBLOB='nodots,allow_utime=0']) 00:39:04 executing program 3: io_uring_setup(0x44ed0, &(0x7f0000000080)={0x0, 0x10007d78, 0x19}) 00:39:04 executing program 5: mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x6, 0x2172, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000007000/0x2000)=nil) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) 00:39:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06000000010000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) close(r1) 00:39:04 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="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", 0x126}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x18, r1, 0x0, 0x0) 00:39:04 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0003}]}) setreuid(0x0, 0x0) [ 409.718032][T21185] FAT-fs (loop2): bogus number of reserved sectors [ 409.724615][T21185] FAT-fs (loop2): Can't find a valid FAT filesystem 00:39:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @loopback}, 0xc) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000240)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff06000000010000005600000025000000190004000400fc63a2985001000000c19e0e1879d632911f7c", 0x39}], 0x1) close(r1) 00:39:04 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) sendmmsg$sock(r0, &(0x7f0000000400)=[{{&(0x7f0000000100)=@nfc_llcp={0x27, 0x2, 0x0, 0x0, 0x0, 0x0, "fd5bbccc44320601009882924b30d713992fab6ee2227d3b90206d9e0c5522e208a5580000763df6701d1385537129779d0000000000e4ffffffffffffff00"}, 0x80, 0x0}}, {{&(0x7f0000000080)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, 0x80, 0x0}}], 0x2, 0x0) 00:39:04 executing program 3: r0 = syz_io_uring_setup(0x136f, &(0x7f0000000080), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000340)=0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_MADVISE={0x19, 0x3, 0x0, 0x0, 0x0, &(0x7f0000001000/0x3000)=nil, 0x3000}, 0x0) set_mempolicy(0x2, &(0x7f0000000240)=0x5, 0x80) syz_io_uring_setup(0x533, &(0x7f0000000580), &(0x7f0000ffa000/0x3000)=nil, &(0x7f00005ea000/0x4000)=nil, &(0x7f0000000000), &(0x7f0000000240)=0x0) syz_io_uring_submit(r1, r3, &(0x7f0000000300)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0xc0) io_uring_enter(r0, 0x302, 0x0, 0x0, 0x0, 0x0) 00:39:04 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000080), 0xc, 0x1e1441) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000000c0)={0x0, 0x0, 0x0, {0x0, 0x100000000000001}, {0x45, 0x2}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0}}) write$evdev(r0, &(0x7f0000000040), 0x2b8) 00:39:04 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r1 = socket(0x400000000000010, 0x802, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$sock_int(r0, 0x1, 0x14, &(0x7f0000000080), 0x10) 00:39:04 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f00000000000004004000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x2100}], 0x0, &(0x7f0000014100)) openat(r0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000040)=""/166, 0xa6) [ 409.830026][T21185] FAT-fs (loop2): bogus number of reserved sectors [ 409.838886][T21185] FAT-fs (loop2): Can't find a valid FAT filesystem 00:39:04 executing program 2: syz_mount_image$msdos(&(0x7f0000000380), &(0x7f00000008c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000fc0), 0x0, &(0x7f0000001040)=ANY=[@ANYBLOB='nodots,allow_utime=0']) 00:39:04 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7fffff7a}]}) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x28, &(0x7f0000000180)="c4c691019919da078a0098d1e0a593b040f7629100f06ee04fa4ea57ff22ea8dc13b97be19af3dcb"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x40) 00:39:04 executing program 4: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0x40345410, &(0x7f0000000080)={0x1}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x5423) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) socket(0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) 00:39:04 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xbb, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@local, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000180)=0x1, 0x23) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x380000, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000300)={@local}, &(0x7f00000004c0)=0x37) [ 409.928108][T21235] loop5: detected capacity change from 0 to 2048 [ 409.955287][T21244] FAT-fs (loop2): bogus number of reserved sectors [ 409.961879][T21244] FAT-fs (loop2): Can't find a valid FAT filesystem [ 409.976766][T21235] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 410.047102][T21235] EXT4-fs error (device loop5): ext4_readdir:243: inode #2: block 16: comm syz-executor.5: path /root/syzkaller-testdir011503010/syzkaller.koNwtC/615/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=0, rec_len=0, name_len=0, size=2048 [ 410.551271][ T25] kauditd_printk_skb: 66514 callbacks suppressed [ 410.551283][ T25] audit: type=1326 audit(1619743144.840:2903316): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 410.582525][ T25] audit: type=1326 audit(1619743144.840:2903317): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 410.607575][ T25] audit: type=1326 audit(1619743144.850:2903318): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 410.632132][ T25] audit: type=1326 audit(1619743144.850:2903319): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 410.656671][ T25] audit: type=1326 audit(1619743144.850:2903320): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 410.686300][ T25] audit: type=1326 audit(1619743144.850:2903321): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 410.711300][ T25] audit: type=1326 audit(1619743144.850:2903322): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 410.736135][ T25] audit: type=1326 audit(1619743144.850:2903323): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 410.760810][ T25] audit: type=1326 audit(1619743144.850:2903324): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 410.785475][ T25] audit: type=1326 audit(1619743144.850:2903325): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 00:39:07 executing program 0: r0 = socket$inet(0x10, 0x80002, 0x0) set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x2) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="24000000210007041dfffd946f610500020000e8fe02080800010800080006000400ff7e", 0x24}], 0x1}, 0x0) 00:39:07 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7fffff7a}]}) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x28, &(0x7f0000000180)="c4c691019919da078a0098d1e0a593b040f7629100f06ee04fa4ea57ff22ea8dc13b97be19af3dcb"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x40) 00:39:07 executing program 2: syz_mount_image$msdos(&(0x7f0000000380), &(0x7f00000008c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000fc0), 0x0, &(0x7f0000001040)=ANY=[@ANYBLOB='nodots,allow_utime=0']) 00:39:07 executing program 4: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0x40345410, &(0x7f0000000080)={0x1}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x5423) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) socket(0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) 00:39:07 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000001200)={0x3c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x10, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x4}, @ETHTOOL_A_BITSET_VALUE={0x4}]}]}, 0x3c}}, 0x0) 00:39:07 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f00000000000004004000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x2100}], 0x0, &(0x7f0000014100)) openat(r0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000040)=""/166, 0xa6) 00:39:07 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7fffff7a}]}) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x28, &(0x7f0000000180)="c4c691019919da078a0098d1e0a593b040f7629100f06ee04fa4ea57ff22ea8dc13b97be19af3dcb"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x40) [ 412.775848][T21281] validate_nla: 22 callbacks suppressed [ 412.775859][T21281] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 412.799180][T21282] loop5: detected capacity change from 0 to 2048 00:39:07 executing program 4: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0x40345410, &(0x7f0000000080)={0x1}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x5423) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) socket(0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) 00:39:07 executing program 0: unshare(0x8020480) r0 = timerfd_create(0x0, 0x0) ppoll(&(0x7f0000000180)=[{r0}], 0x1, &(0x7f00000001c0), 0x0, 0x0) 00:39:07 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7fffff7a}]}) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x28, &(0x7f0000000180)="c4c691019919da078a0098d1e0a593b040f7629100f06ee04fa4ea57ff22ea8dc13b97be19af3dcb"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x40) [ 412.821299][T21279] FAT-fs (loop2): bogus number of reserved sectors [ 412.827776][T21289] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 412.827858][T21279] FAT-fs (loop2): Can't find a valid FAT filesystem 00:39:07 executing program 2: syz_mount_image$msdos(&(0x7f0000000380), &(0x7f00000008c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000fc0), 0x0, &(0x7f0000001040)=ANY=[@ANYBLOB='nodots,allow_utime=0']) 00:39:07 executing program 4: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0x40345410, &(0x7f0000000080)={0x1}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x5423) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) socket(0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) 00:39:07 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000001200)={0x3c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x10, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x4}, @ETHTOOL_A_BITSET_VALUE={0x4}]}]}, 0x3c}}, 0x0) [ 412.911487][T21282] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 412.950787][T21313] netlink: 'syz-executor.1': attribute type 2 has an invalid length. 00:39:07 executing program 0: unshare(0x8020480) r0 = timerfd_create(0x0, 0x0) ppoll(&(0x7f0000000180)=[{r0}], 0x1, &(0x7f00000001c0), 0x0, 0x0) 00:39:07 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f00000000000004004000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x2100}], 0x0, &(0x7f0000014100)) openat(r0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000040)=""/166, 0xa6) 00:39:07 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg$inet6(r1, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=[@pktinfo={{0x24, 0x29, 0x32, {@mcast2}}}], 0xf}}], 0x1, 0x0) 00:39:07 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000001200)={0x3c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x10, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x4}, @ETHTOOL_A_BITSET_VALUE={0x4}]}]}, 0x3c}}, 0x0) [ 412.966658][T21315] FAT-fs (loop2): bogus number of reserved sectors [ 412.973312][T21315] FAT-fs (loop2): Can't find a valid FAT filesystem 00:39:07 executing program 4: pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = socket$nl_sock_diag(0x10, 0x3, 0x4) mount$9p_fd(0x0, &(0x7f00000001c0)='.\x00', &(0x7f0000000000), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}}) write$P9_RVERSION(r1, &(0x7f0000000000)={0x15, 0x65, 0xffff, 0x0, 0x8, '9P2000.L'}, 0x15) 00:39:07 executing program 0: unshare(0x8020480) r0 = timerfd_create(0x0, 0x0) ppoll(&(0x7f0000000180)=[{r0}], 0x1, &(0x7f00000001c0), 0x0, 0x0) 00:39:07 executing program 2: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffffd, 0x7f5a88c0fda4371e) [ 413.060382][T21333] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 413.069442][ T5] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=65380 sclass=netlink_tcpdiag_socket pid=5 comm=kworker/0:0 00:39:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r1, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x60, &(0x7f0000000140)="c4c691019919da078a0098d1e0a593b040f7ecda71e1af90790f5ed75c092b88629100f06ee04fa4ea57ff22ea97be19af3dcba01419cd2386ad59157689c9c6a47312334c2a97ac2b7f0fb4aabebae8dc5dffbcd48a70502173d6efa56b60f4"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x17) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() tkill(r3, 0x34) 00:39:07 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000001200)={0x3c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x10, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x4}, @ETHTOOL_A_BITSET_VALUE={0x4}]}]}, 0x3c}}, 0x0) [ 413.100604][T21339] loop5: detected capacity change from 0 to 2048 00:39:07 executing program 3: open(&(0x7f0000000040)='./file0\x00', 0x80040, 0x0) r0 = inotify_init1(0x0) r1 = inotify_init1(0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) close(r2) r3 = fcntl$dupfd(r1, 0x0, r0) r4 = inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x2000000) inotify_rm_watch(r2, r4) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r5, 0x0) preadv(r5, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FIONREAD(r3, 0x541b, &(0x7f0000001180)) 00:39:07 executing program 0: unshare(0x8020480) r0 = timerfd_create(0x0, 0x0) ppoll(&(0x7f0000000180)=[{r0}], 0x1, &(0x7f00000001c0), 0x0, 0x0) 00:39:07 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newsa={0x140, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@multicast2, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @extra_flags={0x8, 0x18, 0x4}]}, 0x140}}, 0x0) [ 413.132619][T20276] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=65380 sclass=netlink_tcpdiag_socket pid=20276 comm=kworker/1:0 [ 413.159513][T21349] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 413.181648][T21339] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 00:39:07 executing program 5: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000600100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000001000008000000d24201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000076a34e3f63e54dbc8955dd45888f6106010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000016000f000300040000000000000000000f00c5d7", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d3f4655fd4f4655fd4f4655f00000000000004004000000000000800050000000af301000400000000000000000000000100000010", 0x3d, 0x2100}], 0x0, &(0x7f0000014100)) openat(r0, &(0x7f0000000140)='./file1\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000040)=""/166, 0xa6) 00:39:07 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x80108906, 0x0) 00:39:07 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x25, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/meminfo\x00', 0x0, 0x0) [ 413.199227][T21339] EXT4-fs error (device loop5): ext4_readdir:243: inode #2: block 16: comm syz-executor.5: path /root/syzkaller-testdir011503010/syzkaller.koNwtC/617/file0: bad entry in directory: rec_len is smaller than minimal - offset=0, inode=0, rec_len=0, name_len=0, size=2048 00:39:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = gettid() r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r2, &(0x7f0000000080)=""/231, 0xe7) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000040)={0x305, @time}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r2, 0x404c534a, &(0x7f0000000200)) fork() tkill(r1, 0x7) 00:39:07 executing program 0: set_mempolicy(0x3, &(0x7f0000000180)=0xfffffffffffffff9, 0x40) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000600), r1) sendmsg$NLBL_MGMT_C_ADDDEF(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x54, r2, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0xd, 0x1, '!(^^\x1e.{-\x00'}, @NLBL_MGMT_A_IPV6ADDR={0x4, 0x5, @private0}]}, 0x54}}, 0x0) 00:39:07 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000080)={0x0, 0x0}) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x2) connect$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) fcntl$setownex(r0, 0xf, &(0x7f0000000600)={0x0, r2}) sendmmsg(r0, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0x3ec0) 00:39:07 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x25, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/meminfo\x00', 0x0, 0x0) 00:39:07 executing program 0: set_mempolicy(0x3, &(0x7f0000000180)=0xfffffffffffffff9, 0x40) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000600), r1) sendmsg$NLBL_MGMT_C_ADDDEF(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x54, r2, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0xd, 0x1, '!(^^\x1e.{-\x00'}, @NLBL_MGMT_A_IPV6ADDR={0x4, 0x5, @private0}]}, 0x54}}, 0x0) [ 413.306208][T21380] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 413.317803][T21385] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 413.336168][T21381] loop5: detected capacity change from 0 to 2048 00:39:07 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0xd9, &(0x7f00000005c0)="c4c691019919da078a0098d1e0a593b040f762910000ee0d6333b5cacd893169b618322ff6602020511253508b728c2a46e1bc3c0e29b9ab9b7136283e350808ffdb2dbea791095cbc049a7a2e0e16efdca8f75356410b363de4fb357baa17dacdcfac32957dc8bb44e203c4b1bc83d8c0b29f75bcf2e3482945fef116371f8c8c0c4db583a208718ea32a38a8c80eafa4784abac52d51fff3c54e6441351ec08db672e54c2079b6bbdeb2c4d5791b1a1949184e5ad40d1600b170bfdb4ebad75e131100d3a6b87355c63f672c9aa98acbdae02283ebf18158"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd", 0x44}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x40) [ 413.382651][T21381] EXT4-fs (loop5): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. 00:39:07 executing program 3: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000040)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f00000005c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x45) recvmsg(r0, &(0x7f0000002500)={0x0, 0x0, 0x0}, 0x0) readv(r0, &(0x7f0000000840)=[{&(0x7f0000000180)=""/12, 0xc}], 0x1) 00:39:07 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000140)) 00:39:07 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x25, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/meminfo\x00', 0x0, 0x0) [ 413.429432][T21399] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 00:39:07 executing program 1: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000200), 0xf642e7e) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x20) r1 = open(&(0x7f0000000040)='./file0\x00', 0x143042, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000140)={0x0, r0}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 00:39:07 executing program 3: clone3(&(0x7f0000000180)={0x100020400, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:39:07 executing program 4: set_mempolicy(0x2, &(0x7f0000000080)=0x25, 0x3) openat$procfs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/meminfo\x00', 0x0, 0x0) 00:39:07 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x59, 0xfffffeffffff7ffe, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000008c0)=""/106, 0x5b}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/239, 0xfc36}], 0xd, 0x0, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x5b, @private2={0xfc, 0x2, '\x00', 0x1}}, 0x1c) sendto$inet6(r0, &(0x7f0000000300)="a9a1", 0x2, 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000b5e000/0x1000)=nil, 0x1000}, &(0x7f00000002c0)=0x24) 00:39:07 executing program 0: set_mempolicy(0x3, &(0x7f0000000180)=0xfffffffffffffff9, 0x40) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000600), r1) sendmsg$NLBL_MGMT_C_ADDDEF(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x54, r2, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0xd, 0x1, '!(^^\x1e.{-\x00'}, @NLBL_MGMT_A_IPV6ADDR={0x4, 0x5, @private0}]}, 0x54}}, 0x0) 00:39:07 executing program 3: pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000180)="ccb86bfd74707827f0a7e131", 0xc}], 0x3, 0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x120, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x22) 00:39:07 executing program 5: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x12081ff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fcntl$setstatus(r0, 0x4, 0x6100) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000200), 0xf642e7e) 00:39:07 executing program 4: umount2(0x0, 0x1fb7650e106d857f) 00:39:07 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000000)={{0x1b, 0x5b, 0x7, 0x7, 0x3d, 0x0, 0x0, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 00:39:07 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r1, 0x80079a0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r2, 0x0) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(r3, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TCXONC(r3, 0x540a, 0x0) fsetxattr$trusted_overlay_opaque(r3, &(0x7f00000002c0), &(0x7f0000000300), 0x2, 0x1) preadv(r2, &(0x7f0000000280), 0x1, 0x0, 0x0) io_submit(0x0, 0x3, &(0x7f0000000200)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x5, 0x38e, r1, &(0x7f0000000000)="d62bd2390a3dcc8dcf3db4d595ddf9879e2533805dce657c682432d69b20209731e1e82053d0a04aec3e9aedff0cf6c7588142c8e154c8d1f66492ee2b1a367655f4773b4a622aa1249a59603346a35941185754f46b", 0x56, 0xf9a, 0x0, 0x2, r2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x6, 0x4, r0, &(0x7f00000000c0)="0e3a859e3a9f1217ee9a02f74d52d6465ec1231caf40aa0b863d29ec2cac0c6d0a265496cd9b100e33af27d1911bd090282f4fe76c24762d733f7bb9e4d1d3afb4a70c0853dddbad16204db7316f6d1163a420ef87be2074932437f3cfaa4ac7330596fff32f289d6d5881aa6234f575c1d2a5d61c3e092af9b4f99f42e0a6d2", 0x80, 0x1000, 0x0, 0x4}, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x3, 0x2, r0, &(0x7f0000000180)="3a008ef517cd92fe97f99952577480e39e4f5078c3e9e84228bbe492f4", 0x1d, 0xfffffffffffffff8, 0x0, 0x3}]) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r1, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) io_submit(0x0, 0x2, &(0x7f00000005c0)=[&(0x7f0000000500)={0x0, 0x0, 0x0, 0x2, 0x100, r0, &(0x7f0000000480)="86d4beebb5f7499baab915524c2251e94644c7546d3cd65990b05c6228bd60d5efd78622a574812e009591d1a3f75aaed77f", 0x32, 0x1, 0x0, 0x3}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x3, 0xffff, r0, &(0x7f0000000540)="e6ec99d5a783f7693e8adc4927c992bc8807", 0x12, 0x5, 0x0, 0x2}]) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(r4, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TCXONC(r4, 0x540a, 0x0) fsetxattr$trusted_overlay_origin(r4, &(0x7f0000000340), &(0x7f0000000380), 0x2, 0x1) [ 413.654600][T21449] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 00:39:08 executing program 0: set_mempolicy(0x3, &(0x7f0000000180)=0xfffffffffffffff9, 0x40) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000600), r1) sendmsg$NLBL_MGMT_C_ADDDEF(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x54, r2, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0xd, 0x1, '!(^^\x1e.{-\x00'}, @NLBL_MGMT_A_IPV6ADDR={0x4, 0x5, @private0}]}, 0x54}}, 0x0) 00:39:08 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r1 = socket(0x400000000000010, 0x802, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$sock_int(r0, 0x1, 0x25, &(0x7f0000000080), 0x4) [ 413.793874][T21479] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 00:39:08 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$SOCK_DESTROY(r0, &(0x7f00000022c0)={0x0, 0x0, &(0x7f0000002300)={&(0x7f0000000080)={0x20, 0x11, 0x11, 0x0, 0x0, {}, [@INET_DIAG_REQ_BYTECODE={0x9, 0x1, "a3617eb1e9"}]}, 0x20}}, 0x0) 00:39:08 executing program 5: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x12081ff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fcntl$setstatus(r0, 0x4, 0x6100) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000200), 0xf642e7e) 00:39:08 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000780), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_AP(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000e40)={0x34, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_HE_OBSS_PD={0xc, 0x117, 0x0, 0x1, [@NL80211_HE_OBSS_PD_ATTR_MIN_OFFSET={0x5, 0x4}]}]}, 0x34}}, 0x0) 00:39:08 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r1, 0x80079a0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r2, 0x0) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(r3, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TCXONC(r3, 0x540a, 0x0) fsetxattr$trusted_overlay_opaque(r3, &(0x7f00000002c0), &(0x7f0000000300), 0x2, 0x1) preadv(r2, &(0x7f0000000280), 0x1, 0x0, 0x0) io_submit(0x0, 0x3, &(0x7f0000000200)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x5, 0x38e, r1, &(0x7f0000000000)="d62bd2390a3dcc8dcf3db4d595ddf9879e2533805dce657c682432d69b20209731e1e82053d0a04aec3e9aedff0cf6c7588142c8e154c8d1f66492ee2b1a367655f4773b4a622aa1249a59603346a35941185754f46b", 0x56, 0xf9a, 0x0, 0x2, r2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x6, 0x4, r0, &(0x7f00000000c0)="0e3a859e3a9f1217ee9a02f74d52d6465ec1231caf40aa0b863d29ec2cac0c6d0a265496cd9b100e33af27d1911bd090282f4fe76c24762d733f7bb9e4d1d3afb4a70c0853dddbad16204db7316f6d1163a420ef87be2074932437f3cfaa4ac7330596fff32f289d6d5881aa6234f575c1d2a5d61c3e092af9b4f99f42e0a6d2", 0x80, 0x1000, 0x0, 0x4}, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x3, 0x2, r0, &(0x7f0000000180)="3a008ef517cd92fe97f99952577480e39e4f5078c3e9e84228bbe492f4", 0x1d, 0xfffffffffffffff8, 0x0, 0x3}]) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r1, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) io_submit(0x0, 0x2, &(0x7f00000005c0)=[&(0x7f0000000500)={0x0, 0x0, 0x0, 0x2, 0x100, r0, &(0x7f0000000480)="86d4beebb5f7499baab915524c2251e94644c7546d3cd65990b05c6228bd60d5efd78622a574812e009591d1a3f75aaed77f", 0x32, 0x1, 0x0, 0x3}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x3, 0xffff, r0, &(0x7f0000000540)="e6ec99d5a783f7693e8adc4927c992bc8807", 0x12, 0x5, 0x0, 0x2}]) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(r4, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TCXONC(r4, 0x540a, 0x0) fsetxattr$trusted_overlay_origin(r4, &(0x7f0000000340), &(0x7f0000000380), 0x2, 0x1) 00:39:08 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[], 0x208e24b) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000004c40), &(0x7f0000004c80)='./file0\x00', 0x8, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x202, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x2d}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1002}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) preadv(r1, &(0x7f0000004bc0)=[{&(0x7f00000002c0)=""/240, 0xf0}, {0x0}, {0x0}, {0x0}], 0x4, 0x8, 0x0) 00:39:08 executing program 4: prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) munmap(&(0x7f00002d7000/0x3000)=nil, 0x3000) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='environ\x00') preadv(r0, &(0x7f0000001400)=[{&(0x7f0000000040)=""/113, 0x200000b1}], 0x1, 0x2, 0x0) 00:39:08 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x800002, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f0000000140)={0x0, 0x0, 0xa37}) 00:39:08 executing program 5: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x12081ff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fcntl$setstatus(r0, 0x4, 0x6100) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000200), 0xf642e7e) 00:39:08 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r1, 0x80079a0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r2, 0x0) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(r3, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TCXONC(r3, 0x540a, 0x0) fsetxattr$trusted_overlay_opaque(r3, &(0x7f00000002c0), &(0x7f0000000300), 0x2, 0x1) preadv(r2, &(0x7f0000000280), 0x1, 0x0, 0x0) io_submit(0x0, 0x3, &(0x7f0000000200)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x5, 0x38e, r1, &(0x7f0000000000)="d62bd2390a3dcc8dcf3db4d595ddf9879e2533805dce657c682432d69b20209731e1e82053d0a04aec3e9aedff0cf6c7588142c8e154c8d1f66492ee2b1a367655f4773b4a622aa1249a59603346a35941185754f46b", 0x56, 0xf9a, 0x0, 0x2, r2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x6, 0x4, r0, &(0x7f00000000c0)="0e3a859e3a9f1217ee9a02f74d52d6465ec1231caf40aa0b863d29ec2cac0c6d0a265496cd9b100e33af27d1911bd090282f4fe76c24762d733f7bb9e4d1d3afb4a70c0853dddbad16204db7316f6d1163a420ef87be2074932437f3cfaa4ac7330596fff32f289d6d5881aa6234f575c1d2a5d61c3e092af9b4f99f42e0a6d2", 0x80, 0x1000, 0x0, 0x4}, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x3, 0x2, r0, &(0x7f0000000180)="3a008ef517cd92fe97f99952577480e39e4f5078c3e9e84228bbe492f4", 0x1d, 0xfffffffffffffff8, 0x0, 0x3}]) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r1, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) io_submit(0x0, 0x2, &(0x7f00000005c0)=[&(0x7f0000000500)={0x0, 0x0, 0x0, 0x2, 0x100, r0, &(0x7f0000000480)="86d4beebb5f7499baab915524c2251e94644c7546d3cd65990b05c6228bd60d5efd78622a574812e009591d1a3f75aaed77f", 0x32, 0x1, 0x0, 0x3}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x3, 0xffff, r0, &(0x7f0000000540)="e6ec99d5a783f7693e8adc4927c992bc8807", 0x12, 0x5, 0x0, 0x2}]) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(r4, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TCXONC(r4, 0x540a, 0x0) fsetxattr$trusted_overlay_origin(r4, &(0x7f0000000340), &(0x7f0000000380), 0x2, 0x1) 00:39:08 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x28, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x8}, @void, @val={0xc}}}}, 0x28}}, 0x0) 00:39:08 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) personality(0x400000) pkey_mprotect(&(0x7f0000feb000/0x3000)=nil, 0x3000, 0xd, 0xffffffffffffffff) 00:39:08 executing program 5: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x12081ff) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fcntl$setstatus(r0, 0x4, 0x6100) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) write$cgroup_type(r0, &(0x7f0000000200), 0xf642e7e) 00:39:09 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) rename(&(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00') [ 414.640843][T21521] netlink: 'syz-executor.4': attribute type 8 has an invalid length. 00:39:09 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) lseek(r0, 0xffffffffffffffff, 0x0) 00:39:09 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x0, 0x1}}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x400454a4) [ 414.649517][T21524] netlink: 'syz-executor.4': attribute type 8 has an invalid length. 00:39:09 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r1, 0x80079a0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r2, 0x0) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(r3, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TCXONC(r3, 0x540a, 0x0) fsetxattr$trusted_overlay_opaque(r3, &(0x7f00000002c0), &(0x7f0000000300), 0x2, 0x1) preadv(r2, &(0x7f0000000280), 0x1, 0x0, 0x0) io_submit(0x0, 0x3, &(0x7f0000000200)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x5, 0x38e, r1, &(0x7f0000000000)="d62bd2390a3dcc8dcf3db4d595ddf9879e2533805dce657c682432d69b20209731e1e82053d0a04aec3e9aedff0cf6c7588142c8e154c8d1f66492ee2b1a367655f4773b4a622aa1249a59603346a35941185754f46b", 0x56, 0xf9a, 0x0, 0x2, r2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x6, 0x4, r0, &(0x7f00000000c0)="0e3a859e3a9f1217ee9a02f74d52d6465ec1231caf40aa0b863d29ec2cac0c6d0a265496cd9b100e33af27d1911bd090282f4fe76c24762d733f7bb9e4d1d3afb4a70c0853dddbad16204db7316f6d1163a420ef87be2074932437f3cfaa4ac7330596fff32f289d6d5881aa6234f575c1d2a5d61c3e092af9b4f99f42e0a6d2", 0x80, 0x1000, 0x0, 0x4}, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x3, 0x2, r0, &(0x7f0000000180)="3a008ef517cd92fe97f99952577480e39e4f5078c3e9e84228bbe492f4", 0x1d, 0xfffffffffffffff8, 0x0, 0x3}]) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r1, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) io_submit(0x0, 0x2, &(0x7f00000005c0)=[&(0x7f0000000500)={0x0, 0x0, 0x0, 0x2, 0x100, r0, &(0x7f0000000480)="86d4beebb5f7499baab915524c2251e94644c7546d3cd65990b05c6228bd60d5efd78622a574812e009591d1a3f75aaed77f", 0x32, 0x1, 0x0, 0x3}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x3, 0xffff, r0, &(0x7f0000000540)="e6ec99d5a783f7693e8adc4927c992bc8807", 0x12, 0x5, 0x0, 0x2}]) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(r4, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TCXONC(r4, 0x540a, 0x0) fsetxattr$trusted_overlay_origin(r4, &(0x7f0000000340), &(0x7f0000000380), 0x2, 0x1) 00:39:09 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[], 0x208e24b) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000004c40), &(0x7f0000004c80)='./file0\x00', 0x8, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x202, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x2d}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1002}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) preadv(r1, &(0x7f0000004bc0)=[{&(0x7f00000002c0)=""/240, 0xf0}, {0x0}, {0x0}, {0x0}], 0x4, 0x8, 0x0) 00:39:09 executing program 1: r0 = io_uring_setup(0x42eb, &(0x7f0000000100)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000b40)=[0xffffffffffffffff], 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[r1]}, 0x1) 00:39:09 executing program 4: io_setup(0x1, &(0x7f0000001080)=0x0) io_pgetevents(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x200000, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r0, 0x3, &(0x7f00000004c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}, 0x0, 0x0]) 00:39:09 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x59, 0xfffffeffffff7ffe, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r1, &(0x7f0000000940)=[{0x0}, {&(0x7f0000001380)=""/239, 0xef}], 0x2, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000300)="a9a1", 0x2, 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000b5e000/0x1000)=nil, 0x1000}, &(0x7f00000002c0)=0x24) 00:39:09 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r1, 0x80079a0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r2, 0x0) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(r3, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TCXONC(r3, 0x540a, 0x0) fsetxattr$trusted_overlay_opaque(r3, &(0x7f00000002c0), &(0x7f0000000300), 0x2, 0x1) preadv(r2, &(0x7f0000000280), 0x1, 0x0, 0x0) io_submit(0x0, 0x3, &(0x7f0000000200)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x5, 0x38e, r1, &(0x7f0000000000)="d62bd2390a3dcc8dcf3db4d595ddf9879e2533805dce657c682432d69b20209731e1e82053d0a04aec3e9aedff0cf6c7588142c8e154c8d1f66492ee2b1a367655f4773b4a622aa1249a59603346a35941185754f46b", 0x56, 0xf9a, 0x0, 0x2, r2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x6, 0x4, r0, &(0x7f00000000c0)="0e3a859e3a9f1217ee9a02f74d52d6465ec1231caf40aa0b863d29ec2cac0c6d0a265496cd9b100e33af27d1911bd090282f4fe76c24762d733f7bb9e4d1d3afb4a70c0853dddbad16204db7316f6d1163a420ef87be2074932437f3cfaa4ac7330596fff32f289d6d5881aa6234f575c1d2a5d61c3e092af9b4f99f42e0a6d2", 0x80, 0x1000, 0x0, 0x4}, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x3, 0x2, r0, &(0x7f0000000180)="3a008ef517cd92fe97f99952577480e39e4f5078c3e9e84228bbe492f4", 0x1d, 0xfffffffffffffff8, 0x0, 0x3}]) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r1, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) io_submit(0x0, 0x2, &(0x7f00000005c0)=[&(0x7f0000000500)={0x0, 0x0, 0x0, 0x2, 0x100, r0, &(0x7f0000000480)="86d4beebb5f7499baab915524c2251e94644c7546d3cd65990b05c6228bd60d5efd78622a574812e009591d1a3f75aaed77f", 0x32, 0x1, 0x0, 0x3}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x3, 0xffff, r0, &(0x7f0000000540)="e6ec99d5a783f7693e8adc4927c992bc8807", 0x12, 0x5, 0x0, 0x2}]) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(r4, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TCXONC(r4, 0x540a, 0x0) fsetxattr$trusted_overlay_origin(r4, &(0x7f0000000340), &(0x7f0000000380), 0x2, 0x1) 00:39:09 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000080)={{0xe, 0x9b, 0x8, 0x7, 0x0, 0x3b, 0x0, 0x35, 0x448, 0x0, 0x0, 0x0, 0x0, 0x40}}, 0x40) 00:39:09 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x4c}, {0x6}]}) 00:39:09 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000180)="9000000012001f4d154a817393278bff0a80a578020000000404840014000100ac1414bb0542d6401051a2d708f37ac8da1a297e0099c5ac0000c5b068d0bf46d323456536016466fcb78dcaaf6c3efed495a46215be0000766436c0c80cefd28581d158ba86c9d2896c6d3bca2d0000000b0015009e49a6560641263da4de1df32c1739d7fbee9aa241731ae9e0b390", 0x90, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000d40)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000006c0)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) [ 415.375521][T21582] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.1'. [ 415.415372][T21583] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.1'. 00:39:09 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r1 = socket(0x400000000000010, 0x802, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x21, &(0x7f0000000080)={@multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1}, 0xc) 00:39:09 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[], 0x208e24b) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000004c40), &(0x7f0000004c80)='./file0\x00', 0x8, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x202, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x2d}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1002}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) preadv(r1, &(0x7f0000004bc0)=[{&(0x7f00000002c0)=""/240, 0xf0}, {0x0}, {0x0}, {0x0}], 0x4, 0x8, 0x0) 00:39:09 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000180)="9000000012001f4d154a817393278bff0a80a578020000000404840014000100ac1414bb0542d6401051a2d708f37ac8da1a297e0099c5ac0000c5b068d0bf46d323456536016466fcb78dcaaf6c3efed495a46215be0000766436c0c80cefd28581d158ba86c9d2896c6d3bca2d0000000b0015009e49a6560641263da4de1df32c1739d7fbee9aa241731ae9e0b390", 0x90, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000d40)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000006c0)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) [ 415.532745][T21593] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.1'. [ 415.568110][ T25] kauditd_printk_skb: 64108 callbacks suppressed [ 415.568119][ T25] audit: type=1326 audit(1619743149.851:2967434): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 415.607766][ T25] audit: type=1326 audit(1619743149.861:2967435): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 415.668073][ T25] audit: type=1326 audit(1619743149.861:2967436): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 415.719566][ T25] audit: type=1326 audit(1619743149.861:2967437): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 415.774951][ T25] audit: type=1326 audit(1619743149.861:2967438): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 415.827671][ T25] audit: type=1326 audit(1619743149.861:2967439): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 415.880476][ T25] audit: type=1326 audit(1619743149.861:2967440): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 415.904937][ T25] audit: type=1326 audit(1619743149.861:2967441): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 415.905043][ T25] audit: type=1326 audit(1619743149.861:2967442): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 00:39:10 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r1, 0x80079a0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r2, 0x0) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(r3, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TCXONC(r3, 0x540a, 0x0) fsetxattr$trusted_overlay_opaque(r3, &(0x7f00000002c0), &(0x7f0000000300), 0x2, 0x1) preadv(r2, &(0x7f0000000280), 0x1, 0x0, 0x0) io_submit(0x0, 0x3, &(0x7f0000000200)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x5, 0x38e, r1, &(0x7f0000000000)="d62bd2390a3dcc8dcf3db4d595ddf9879e2533805dce657c682432d69b20209731e1e82053d0a04aec3e9aedff0cf6c7588142c8e154c8d1f66492ee2b1a367655f4773b4a622aa1249a59603346a35941185754f46b", 0x56, 0xf9a, 0x0, 0x2, r2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x6, 0x4, r0, &(0x7f00000000c0)="0e3a859e3a9f1217ee9a02f74d52d6465ec1231caf40aa0b863d29ec2cac0c6d0a265496cd9b100e33af27d1911bd090282f4fe76c24762d733f7bb9e4d1d3afb4a70c0853dddbad16204db7316f6d1163a420ef87be2074932437f3cfaa4ac7330596fff32f289d6d5881aa6234f575c1d2a5d61c3e092af9b4f99f42e0a6d2", 0x80, 0x1000, 0x0, 0x4}, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x3, 0x2, r0, &(0x7f0000000180)="3a008ef517cd92fe97f99952577480e39e4f5078c3e9e84228bbe492f4", 0x1d, 0xfffffffffffffff8, 0x0, 0x3}]) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r1, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) io_submit(0x0, 0x2, &(0x7f00000005c0)=[&(0x7f0000000500)={0x0, 0x0, 0x0, 0x2, 0x100, r0, &(0x7f0000000480)="86d4beebb5f7499baab915524c2251e94644c7546d3cd65990b05c6228bd60d5efd78622a574812e009591d1a3f75aaed77f", 0x32, 0x1, 0x0, 0x3}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x3, 0xffff, r0, &(0x7f0000000540)="e6ec99d5a783f7693e8adc4927c992bc8807", 0x12, 0x5, 0x0, 0x2}]) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(r4, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TCXONC(r4, 0x540a, 0x0) fsetxattr$trusted_overlay_origin(r4, &(0x7f0000000340), &(0x7f0000000380), 0x2, 0x1) 00:39:10 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000001940)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="140000001e00010a"], 0x14}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000180)=ANY=[], 0xfffffc7b) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x4001}, 0x10) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 00:39:10 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000180)="9000000012001f4d154a817393278bff0a80a578020000000404840014000100ac1414bb0542d6401051a2d708f37ac8da1a297e0099c5ac0000c5b068d0bf46d323456536016466fcb78dcaaf6c3efed495a46215be0000766436c0c80cefd28581d158ba86c9d2896c6d3bca2d0000000b0015009e49a6560641263da4de1df32c1739d7fbee9aa241731ae9e0b390", 0x90, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000d40)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000006c0)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) 00:39:10 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[], 0x208e24b) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, &(0x7f0000004c40), &(0x7f0000004c80)='./file0\x00', 0x8, 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x202, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) readv(r2, &(0x7f0000001900)=[{&(0x7f0000000080)=""/54, 0x36}, {&(0x7f0000000400)=""/111, 0x6f}, {&(0x7f0000000480)=""/82, 0x52}, {&(0x7f0000000500)=""/71, 0x2d}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f0000000600)=""/240, 0xfffffd74}, {&(0x7f0000000700)=""/4096, 0x1002}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/236, 0xec}, {&(0x7f0000001800)=""/254, 0xfe}], 0xa) preadv(r1, &(0x7f0000004bc0)=[{&(0x7f00000002c0)=""/240, 0xf0}, {0x0}, {0x0}, {0x0}], 0x4, 0x8, 0x0) [ 415.905070][ T25] audit: type=1326 audit(1619743149.861:2967443): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 416.053787][T21609] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.1'. 00:39:10 executing program 5: syz_io_uring_setup(0x4a0d, &(0x7f0000000040), &(0x7f0000ff9000/0x5000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f00000000c0), 0x0) syz_io_uring_setup(0x5a3d, &(0x7f0000000140), &(0x7f0000ff7000/0x8000)=nil, &(0x7f0000ff7000/0x2000)=nil, &(0x7f00000001c0), 0x0) syz_io_uring_setup(0x5448, &(0x7f0000000240), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000002c0), &(0x7f0000000300)) 00:39:10 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000240)='\x103q}2\x9a\xce\xaf\x03\x86\xe7\xc0\x14\x8f\xf8\xd28\xf4\x1c\xc0\xf9\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94\xeb\xcd\t\x00\x90k\xd6\x05\r\x84\x87\x1c\b\x8c`\xea\x13A\x90m\xb6&\xd0\x9daA\xc5\xb8_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\xc0\x8b\x19\x17\xb7Rvd\xcb:\b', 0x0) ftruncate(r1, 0x80079a0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r2, 0x0) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(r3, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TCXONC(r3, 0x540a, 0x0) fsetxattr$trusted_overlay_opaque(r3, &(0x7f00000002c0), &(0x7f0000000300), 0x2, 0x1) preadv(r2, &(0x7f0000000280), 0x1, 0x0, 0x0) io_submit(0x0, 0x3, &(0x7f0000000200)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x5, 0x38e, r1, &(0x7f0000000000)="d62bd2390a3dcc8dcf3db4d595ddf9879e2533805dce657c682432d69b20209731e1e82053d0a04aec3e9aedff0cf6c7588142c8e154c8d1f66492ee2b1a367655f4773b4a622aa1249a59603346a35941185754f46b", 0x56, 0xf9a, 0x0, 0x2, r2}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x6, 0x4, r0, &(0x7f00000000c0)="0e3a859e3a9f1217ee9a02f74d52d6465ec1231caf40aa0b863d29ec2cac0c6d0a265496cd9b100e33af27d1911bd090282f4fe76c24762d733f7bb9e4d1d3afb4a70c0853dddbad16204db7316f6d1163a420ef87be2074932437f3cfaa4ac7330596fff32f289d6d5881aa6234f575c1d2a5d61c3e092af9b4f99f42e0a6d2", 0x80, 0x1000, 0x0, 0x4}, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x3, 0x2, r0, &(0x7f0000000180)="3a008ef517cd92fe97f99952577480e39e4f5078c3e9e84228bbe492f4", 0x1d, 0xfffffffffffffff8, 0x0, 0x3}]) mmap(&(0x7f0000200000/0x400000)=nil, 0x400000, 0xa601, 0x2012, r1, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) io_submit(0x0, 0x2, &(0x7f00000005c0)=[&(0x7f0000000500)={0x0, 0x0, 0x0, 0x2, 0x100, r0, &(0x7f0000000480)="86d4beebb5f7499baab915524c2251e94644c7546d3cd65990b05c6228bd60d5efd78622a574812e009591d1a3f75aaed77f", 0x32, 0x1, 0x0, 0x3}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x3, 0xffff, r0, &(0x7f0000000540)="e6ec99d5a783f7693e8adc4927c992bc8807", 0x12, 0x5, 0x0, 0x2}]) perf_event_open(&(0x7f00000003c0)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(r4, 0x5412, &(0x7f00000000c0)=0x13) ioctl$TCXONC(r4, 0x540a, 0x0) fsetxattr$trusted_overlay_origin(r4, &(0x7f0000000340), &(0x7f0000000380), 0x2, 0x1) 00:39:10 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000180)="9000000012001f4d154a817393278bff0a80a578020000000404840014000100ac1414bb0542d6401051a2d708f37ac8da1a297e0099c5ac0000c5b068d0bf46d323456536016466fcb78dcaaf6c3efed495a46215be0000766436c0c80cefd28581d158ba86c9d2896c6d3bca2d0000000b0015009e49a6560641263da4de1df32c1739d7fbee9aa241731ae9e0b390", 0x90, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000d40)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000006c0)=[{0x0}], 0x1}}], 0x2, 0x0, 0x0) [ 416.176904][T21622] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.1'. 00:39:10 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000012c0)={@in6={{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}, 0x0, 0x0, 0xf, 0x0, "0c9e089c1b4a01860b479037f43d223b3c1b324debec40e57a07f7bd417eb48821996aff1e7154e746be4d7686455261c425a7519cc275d04e6205abd307a0c4fa3838bf399ad5bd35f21907c7988d13"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @empty}}, 0x0, 0x0, 0x2d, 0x0, "a1c1dd75a68473ba07d945c3b03e10951cd4b347113e55eb499419be4f7542da0bc21470e441225642855b5f2f4bb561dc9363aed4a18d67efd5f2fdf98328de9441031348589b763d46d14810acc5f7"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000200)={@in6={{0xa, 0x0, 0x0, @private0}}, 0x0, 0x0, 0x23, 0x0, "a1c1dd75a68473ba07d945c3b03e10951cd4b347113e55eb499419be4f7542da0bc21470e441225442855b5f2f4bb561dc9363aed4a18d67efd5f2fdf98328de9441031348589b763d46d14810acc5f7"}, 0xd8) 00:39:10 executing program 5: io_setup(0x5, &(0x7f0000000140)=0x0) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000100), 0x2) io_submit(r0, 0x1, &(0x7f0000000340)=[&(0x7f0000000000)={0x0, 0x0, 0x700000000000000, 0x5, 0x0, r1, 0x0}]) 00:39:10 executing program 1: socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = getpid() r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0x0, r3) sendmsg$netlink(r0, &(0x7f0000001340)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {r1, 0x0, r3}}}], 0x20}, 0x0) 00:39:10 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000004c0)=@updpolicy={0xb8, 0x15, 0x1, 0x0, 0x0, {{@in6=@remote, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}}, 0xb8}}, 0x0) 00:39:10 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x4) 00:39:11 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) connect$inet6(r0, 0x0, 0x0) 00:39:11 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000001940)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="140000001e00010a"], 0x14}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000180)=ANY=[], 0xfffffc7b) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x4001}, 0x10) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 00:39:11 executing program 1: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$PTP_EXTTS_REQUEST2(r0, 0x40103d0b, &(0x7f0000000080)={0x0, 0x1}) 00:39:11 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x2a, &(0x7f0000002600)="c4c691019919da078a0098d1e0a593b040f7629100f06ee04fa4ea57ff22ea97be19af3dcba01419cd23"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x34) 00:39:11 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) clone(0x2000000080204500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = getpid() r3 = getpid() rt_tgsigqueueinfo(r3, r3, 0x16, &(0x7f0000000000)) ptrace(0x10, r3) ptrace$getsig(0x420a, r2, 0x8, 0x0) 00:39:11 executing program 2: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x154, &(0x7f0000000140)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x40) 00:39:11 executing program 3: unshare(0x600) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000000)) 00:39:11 executing program 2: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) io_setup(0x100, &(0x7f0000000000)=0x0) io_submit(r1, 0x1, &(0x7f00000018c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) 00:39:11 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x87, &(0x7f0000000080), &(0x7f00006d8000/0x2000)=nil, &(0x7f00006d4000/0x4000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000001040)=0x0) syz_io_uring_submit(0x0, r3, &(0x7f0000000200)=@IORING_OP_POLL_ADD={0x6, 0x4, 0x0, @fd=r0}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000240)=@IORING_OP_EPOLL_CTL=@del, 0xda) io_uring_enter(r1, 0x205d, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r5 = openat$vcsu(0xffffffffffffff9c, 0x0, 0x400200, 0x0) r6 = socket$inet6_udp(0xa, 0x2, 0x0) r7 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000040)={'sit0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r6, 0x890b, &(0x7f00000002c0)={@local, @private2, @dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r8}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r5, 0x89f3, &(0x7f0000000280)={'ip6_vti0\x00', &(0x7f0000000200)={'syztnl1\x00', r8, 0x29, 0xff, 0x3, 0x9b, 0x40, @dev={0xfe, 0x80, '\x00', 0x19}, @ipv4={'\x00', '\xff\xff', @rand_addr=0xb815}, 0x7800, 0x7, 0x3, 0x7fff}}) ioctl$sock_ipv6_tunnel_SIOCADDPRL(r4, 0x89f5, &(0x7f0000000000)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6tnl0\x00', r8, 0x2f, 0x8, 0x5, 0x101, 0x51, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7, 0x8000, 0xf, 0x8}}) 00:39:11 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SNAPSHOT_PREF_IMAGE_SIZE(r0, 0x3312, 0x0) 00:39:11 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='setgroups\x00') write$cgroup_devices(r1, 0x0, 0x7) 00:39:11 executing program 1: futex(0xfffffffffffffffc, 0x5, 0x0, 0x0, 0x0, 0x0) 00:39:11 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000000)="441f3609000000e8c94ef56691ee54be0e1c2074ed26c1c6fe76ce15e2", 0x1d) getsockopt$inet_opts(r0, 0x0, 0x4, 0x0, &(0x7f0000000100)) 00:39:12 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000001940)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="140000001e00010a"], 0x14}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000180)=ANY=[], 0xfffffc7b) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x4001}, 0x10) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 00:39:12 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='ceph\x00', 0x0, 0x0) 00:39:12 executing program 1: r0 = syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004000000c0b80f", 0xf, 0x800}, {&(0x7f0000000d40)="ffffff03000000000000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff5d6bffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x801, 0x1001}, {&(0x7f0000011500)="ed41000000080000d3f4655fd3f4655fd3f4655f000000000000040004", 0x1d, 0x2200}], 0x0, &(0x7f0000000080)=ANY=[]) mknodat$null(r0, &(0x7f0000000000)='./file0\x00', 0x0, 0x103) 00:39:12 executing program 2: r0 = io_uring_setup(0x348e, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000001240)={0x0, 0x0, 0x0, 0x0, &(0x7f00000011c0)=[@rights={{0x14, 0x1, 0x1, [r0]}}, @rights={{0x14, 0x1, 0x1, [r0]}}], 0x30}, 0x0) 00:39:12 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ftruncate(0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r1) 00:39:12 executing program 0: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$tcp_mem(0xffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) fstat(r0, &(0x7f00000001c0)) 00:39:12 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='ceph\x00', 0x0, 0x0) 00:39:12 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x7ff}) 00:39:12 executing program 1: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/pid_for_children\x00') ioctl$NS_GET_PARENT(r0, 0xc0189436, 0x4001b4) 00:39:12 executing program 0: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$tcp_mem(0xffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) fstat(r0, &(0x7f00000001c0)) 00:39:12 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='ceph\x00', 0x0, 0x0) 00:39:12 executing program 3: r0 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000001400)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb96951d6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b855c4e70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9c9dbec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347c36bff62f313079983409d7f9cf1242c917985c1b5d0736fe21f8514f63d0369a374c42da40bd5140bc3e602d00c3cb4f8e621863ab47422778d67d72de34753fd72cef80649a1548e4e8dcbcffe4054cc9d8a1f922623a75904cbdaacde768131e587269a4a99d82f7009c1b8ab79aa232a2fd45ad71b603803123f6ba979fa6a87525884b08d721a21400fb1f950b96ead82f408cc4388d3b78fb456616429a520656d5e5a876fd04748498902c86f58d45f4c1b3919eb846a00edf07e7a830bf723e4774f085f15534dd3b5246c0c0970b5ad7bb39b30b156a9430378c5b0aab1261c78d72ac301cd552d5e8dd4b642ec1dc0672745d593bb26d095b5b23576e3cfd6ab580f6e09419d0f0c64250fafaa3759aa1888da48d89c3f7c9454b0b3d0ab40445f5bed4493ef43ab08f31b1345ac4ffd94ad79c9eee53904ed6f572817153190d2e6863f2e39356bb99926419fd314341a536b7e76cae60bf7750a4c29e3f4c7f005530b1d4ee0e25b93b76fcc1108222f0b00de52cf4100e97adfd7b9db1370586ba27e1e183299be00d0df8439c380edf2f79deb441eac59b814b04accdff5e17f02046139f91f0332661676ff506e575f0cb2850bcc9f8666f6d1f69f8f4271cb804a79fccd7016f049d1a494c26a527c437fa0be6d51ec7543d9bd7a2f016194ebe3c99080a6c9b5119863dfe865f8e60cae29f50b67dbfaa0a3c9794d73034485ca1613344c572783db3dfab01b28089c51cda99cefa4c1c881a29e229f04c7e0fd04dc425ae8417852e6e31520c6207e9d4e35285feef2a2cb8a3bceb08a166fa4284a516362621e2c06731a442791f1db063a32cf1f005c914102c7273cb4d7ab1bf567d72f230783d2ea99c43a60e8729132441ee6c5362c33f9b613f84417c3c5549f4e3d9e73c6f83f16c8e57ae22fe5f54515e111fe43ad7c400d214281452bb6141cecad84b23a695f061988d906d03be5d89584634b9e9d9a9b072f8e7cbb47c47719318a2001cafa665dd2c82672d16877ea115bd023fc1975f7c59664bfb06f66a1a5e3f05cb283fb45ea67a2727ee6e10bf35b31fdd03d43ec67b753f6737e0d2f4a5275031595878cefc8f0ca", 0x600) write$P9_RFLUSH(r0, &(0x7f0000000040)={0x7}, 0x7) sendfile(r0, r1, 0x0, 0xfffe) 00:39:12 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000001940)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="140000001e00010a"], 0x14}}, 0x0) write$binfmt_misc(r2, &(0x7f0000000180)=ANY=[], 0xfffffc7b) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x4001}, 0x10) splice(r1, 0x0, r3, 0x0, 0x4ffe0, 0x0) 00:39:12 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) clone(0x180000105, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='ceph\x00', 0x0, 0x0) 00:39:12 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000180), 0x0, 0x5) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000000)="53000000fcffffff7700f80e000000", 0xff4a}, {&(0x7f0000000080)="12b247299e67bfdb1fd2cf82e93f497efcba98c857535ccc04be04839efbe7925fb2184879d3348a8e9b3107f679ca4d5a9f0ff9e2f023a996", 0x39}], 0x3) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000100)="ae88bff8240200005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}], 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$SG_GET_NUM_WAITING(r0, 0x2286, &(0x7f0000000140)) 00:39:12 executing program 0: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$tcp_mem(0xffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) fstat(r0, &(0x7f00000001c0)) 00:39:12 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000380)={0x2, &(0x7f0000000340)=[{}, {0x8}]}) 00:39:12 executing program 3: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='unhide,dmode=0']) 00:39:12 executing program 0: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$tcp_mem(0xffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) fstat(r0, &(0x7f00000001c0)) 00:39:13 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x225, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000527000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r3, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f00000000c0)=0x1914, 0x4) bind$inet6(r4, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x24044004, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x18) setsockopt$sock_int(r4, 0x1, 0x1d, &(0x7f0000000000)=0x76, 0x4) sendto$inet6(r4, &(0x7f0000000000)="cc", 0x1, 0x0, 0x0, 0x0) recvmsg(r4, &(0x7f0000001200)={&(0x7f0000000080)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000001100), 0x0, &(0x7f0000001480)=""/153, 0x99}, 0x0) 00:39:13 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0x10, 0x3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) sendto$inet6(r3, &(0x7f0000000140)="1ba0000016001d0d89fdc5cbdd045798707bed4dca141a780f0f8e", 0xff7f, 0x0, 0x0, 0x0) readv(r3, &(0x7f0000000500)=[{&(0x7f0000000180)=""/98, 0x62}], 0x1) recvfrom$inet6(r3, &(0x7f0000000000)=""/47, 0x2f, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000000)="480500001400", 0x6}], 0x1) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x200000000e26a, 0x0) [ 418.686662][ C1] sd 0:0:1:0: [sg0] tag#4655 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK cmd_age=0s [ 418.698461][ C1] sd 0:0:1:0: [sg0] tag#4655 CDB: Search Equal [ 418.704653][ C1] sd 0:0:1:0: [sg0] tag#4655 CDB[00]: 31 ed 49 89 d1 5e 48 89 e2 48 83 e4 f0 50 54 49 [ 418.714571][ C1] sd 0:0:1:0: [sg0] tag#4655 CDB[10]: c7 c0 f0 b7 41 00 48 c7 c1 60 b7 41 00 48 c7 c7 [ 418.724773][ C1] sd 0:0:1:0: [sg0] tag#4655 CDB[20]: 70 17 40 00 67 e8 f6 7e 01 00 f4 0f 1f 44 00 00 00:39:13 executing program 1: r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000000)={0x0, 0x100000000004, 0x1}) [ 418.734334][ C1] sd 0:0:1:0: [sg0] tag#4655 CDB[30]: c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 [ 418.744124][ C1] sd 0:0:1:0: [sg0] tag#4655 CDB[40]: b8 f0 89 54 00 48 3d f0 89 54 00 74 13 b8 00 00 [ 418.753967][ C1] sd 0:0:1:0: [sg0] tag#4655 CDB[50]: 00 00 48 85 c0 74 09 bf f0 89 54 00 ff e0 66 90 [ 418.763565][ C1] sd 0:0:1:0: [sg0] tag#4655 CDB[60]: c3 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 [ 418.773140][ C1] sd 0:0:1:0: [sg0] tag#4655 CDB[70]: be f0 89 54 00 48 81 00:39:13 executing program 1: r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000000)={0x0, 0x100000000004, 0x1}) [ 418.798641][T21776] ISOFS: Unable to identify CD-ROM format. [ 418.820999][T21796] __nla_validate_parse: 1 callbacks suppressed [ 418.821011][T21796] netlink: 1288 bytes leftover after parsing attributes in process `syz-executor.0'. 00:39:13 executing program 2: sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, 0x0}, 0x0) move_pages(0x0, 0x2c9, &(0x7f0000000000), &(0x7f000026bfec), &(0x7f0000002000), 0x0) [ 418.857220][T21776] ISOFS: Unable to identify CD-ROM format. 00:39:13 executing program 1: r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000000)={0x0, 0x100000000004, 0x1}) 00:39:13 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000440)={@ipv4={'\x00', '\xff\xff', @loopback}}, 0x20) 00:39:13 executing program 2: set_mempolicy(0x1, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='net/netstat\x00') 00:39:13 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000100)={0x2, &(0x7f0000000040)=[{0x30, 0x0, 0x0, 0xfffff038}, {0x6}]}, 0x10) 00:39:13 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) unshare(0x4000400) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = dup2(r0, r0) lseek(r1, 0x0, 0x1) 00:39:13 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000300)="82bb7102cc6509f63760ce03f12c2baf577e6f0503c9ca91e9a868377ce26dc445a7443fdcde8856729a95", 0x2b}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x36) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$NL802154_CMD_DEL_SEC_DEVKEY(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000000c0)={0x34, 0x0, 0x0, 0x0, 0x0, {}, [@NL802154_ATTR_SEC_DEVKEY={0xc, 0x24, 0x0, 0x1, [@NL802154_DEVKEY_ATTR_FRAME_COUNTER={0x8}]}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x34}}, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 00:39:13 executing program 4: unshare(0x8000400) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000003440), 0x240000, 0x0) listen(r0, 0x0) 00:39:14 executing program 5: r0 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000580)="ff", 0x1, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000540), &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) add_key$user(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x2}, &(0x7f00000001c0)="e3", 0x1, r2) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000340)='asymmetric\x00', &(0x7f0000000080)=@keyring={'key_or_keyring:', r0}) keyctl$KEYCTL_MOVE(0x1e, r1, 0xffffffffffffffff, r2, 0x0) 00:39:14 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0x10, 0x3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) sendto$inet6(r3, &(0x7f0000000140)="1ba0000016001d0d89fdc5cbdd045798707bed4dca141a780f0f8e", 0xff7f, 0x0, 0x0, 0x0) readv(r3, &(0x7f0000000500)=[{&(0x7f0000000180)=""/98, 0x62}], 0x1) recvfrom$inet6(r3, &(0x7f0000000000)=""/47, 0x2f, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000000)="480500001400", 0x6}], 0x1) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x200000000e26a, 0x0) 00:39:14 executing program 1: r0 = creat(&(0x7f0000000240)='./file0\x00', 0x0) ioctl$FITRIM(r0, 0xc020662a, &(0x7f0000000000)={0x0, 0x100000000004, 0x1}) 00:39:14 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) unshare(0x4000400) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = dup2(r0, r0) lseek(r1, 0x0, 0x1) 00:39:14 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x9, &(0x7f0000000080), 0x14) getsockopt$inet_tcp_int(r2, 0x6, 0x9, 0x0, &(0x7f0000000040)) 00:39:14 executing program 2: r0 = syz_io_uring_setup(0x187, &(0x7f00000002c0), &(0x7f00006d5000/0x2000)=nil, &(0x7f00006d6000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_SEND={0x1a, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x881}, 0x0) io_uring_enter(r0, 0x2a6e, 0x0, 0x0, 0x0, 0xe) 00:39:14 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) unshare(0x4000400) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = dup2(r0, r0) lseek(r1, 0x0, 0x1) 00:39:14 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000003c0)={0xa, 0x4e22, 0x0, @empty}, 0x1c) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f00000002c0)=0x5, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x14e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) close(r1) 00:39:14 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000480), 0x498002, 0x0) 00:39:14 executing program 2: getresuid(0x0, 0x0, 0x0) 00:39:14 executing program 1: r0 = socket(0x10, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0xee00) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000040)={0x2}, 0x4) 00:39:14 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) unshare(0x4000400) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r0, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x9, 0x0) r1 = dup2(r0, r0) lseek(r1, 0x0, 0x1) 00:39:14 executing program 5: openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/diskstats\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') fchdir(r0) r1 = memfd_create(&(0x7f0000000340)='\x00\xc2\xea\x99\xbb\x1c\xf8jw\x97\x05\xa3\xa2\'\xdd\xe4q\xbf\t\x8c\xe0\x19\xe5\xbcJ6\xfc\xa8\xcdj\xc1F\x02\x93\xca`\x8e\x00\x00\x00\x00\x00\x00\x00\x00\x00\b \xff\x13\x96\xe3?\xdfH\x8c\xe4V\xe2\xfe\v8\x04\xa5\xb9\xc4:\xf3\xf6y_w\xd8\xcf\x90k\x05\x00\xf9\x1e\xe8m\xec\x12\xa015\xc2\xb3u|K\x111\xd4\f8\xeb\x18\xad\xbb!1\x85\x96P\x1b\xa1\x9a\x81\xf8\xb1\xecB)\xe5\xaa7\xfe\xdd,_D\xe5|\xb1j^\xaec}\x1a\xb4\x17\xafP\x85I\xd5\xa0I\xb0\xaf\xb5\x8b\\\x05\xd7g\xcbV\x8e\xd0\xac\x87I7\xbd\xc6\x9bI\x92\xb2\x87.\xb3\x1fs\xe7%\xdd+\r\xb4\x117\xa7ei~\xb8\x16\xd1P\xf2\x84\x89K\x16\xd0F|\xa3\x89\xc9~9\x00\x00\x00\x00\x00\x00\x00', 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) write(r1, &(0x7f00000000c0)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) r3 = inotify_init1(0x0) r4 = inotify_init1(0x0) inotify_add_watch(r4, &(0x7f0000000040)='./file0\x00', 0xc40001e1) inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0xc40001e1) creat(&(0x7f0000000040)='./file0\x00', 0x0) [ 419.931822][T21873] netlink: 1288 bytes leftover after parsing attributes in process `syz-executor.0'. [ 420.570418][ T25] kauditd_printk_skb: 70959 callbacks suppressed [ 420.570430][ T25] audit: type=1326 audit(1619743154.861:3038403): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 420.602083][ T25] audit: type=1326 audit(1619743154.871:3038404): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 420.626841][ T25] audit: type=1326 audit(1619743154.871:3038405): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 00:39:14 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0x10, 0x3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) sendto$inet6(r3, &(0x7f0000000140)="1ba0000016001d0d89fdc5cbdd045798707bed4dca141a780f0f8e", 0xff7f, 0x0, 0x0, 0x0) readv(r3, &(0x7f0000000500)=[{&(0x7f0000000180)=""/98, 0x62}], 0x1) recvfrom$inet6(r3, &(0x7f0000000000)=""/47, 0x2f, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000000)="480500001400", 0x6}], 0x1) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x200000000e26a, 0x0) 00:39:14 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000480), 0x498002, 0x0) 00:39:14 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) close(r0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000340), 0x1, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) writev(r0, &(0x7f0000000780)=[{&(0x7f0000000100)="dff548771d77ce8786aca76dda6fb054ab8ea73799d7293eda90ba41a2db81fab55b5415802300a8e64bca2f60e1717f85f06a6bbca90f392b04f34b40db7ffccc33ed6ea82296de9683c9e360851c477304bd8f9bd74d44a4", 0x5}, {&(0x7f0000001340)="f15c93cb35c215fe339d1e9060c5b23e77cb58a87329a00288504db389cc6e395885fa906ac30eeae99fa388c31b5717e641e1586a90961b5f99b26c939d944f6cb1cf6817b7e51402a8459f9db642e97d3c05db56250a665d3ff188eb47e5b036d508aa5a5796fb8806b6a41487e0bfc3df087c18269bd7d2f477104c5d5d", 0x5d}], 0x2) 00:39:14 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_timeval(r2, 0x1, 0x2f, &(0x7f0000000200), &(0x7f0000000240)=0x10) 00:39:14 executing program 3: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f00000001c0)={{0x2, 0x0, @local}, {}, 0x68, {0x2, 0x0, @broadcast}}) 00:39:14 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="1c00000018007f5f00fe01b2a4a28093020600feff000001080b0000", 0x1c}], 0x1}, 0x0) [ 420.651232][ T25] audit: type=1326 audit(1619743154.871:3038406): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 420.676202][ T25] audit: type=1326 audit(1619743154.871:3038407): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 00:39:15 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000480), 0x498002, 0x0) 00:39:15 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) close(r0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000340), 0x1, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) writev(r0, &(0x7f0000000780)=[{&(0x7f0000000100)="dff548771d77ce8786aca76dda6fb054ab8ea73799d7293eda90ba41a2db81fab55b5415802300a8e64bca2f60e1717f85f06a6bbca90f392b04f34b40db7ffccc33ed6ea82296de9683c9e360851c477304bd8f9bd74d44a4", 0x5}, {&(0x7f0000001340)="f15c93cb35c215fe339d1e9060c5b23e77cb58a87329a00288504db389cc6e395885fa906ac30eeae99fa388c31b5717e641e1586a90961b5f99b26c939d944f6cb1cf6817b7e51402a8459f9db642e97d3c05db56250a665d3ff188eb47e5b036d508aa5a5796fb8806b6a41487e0bfc3df087c18269bd7d2f477104c5d5d", 0x5d}], 0x2) [ 420.723675][ T25] audit: type=1326 audit(1619743154.871:3038408): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 00:39:15 executing program 3: add_key$user(&(0x7f0000000240), 0x0, &(0x7f00000002c0)="1695aea861616a9ba1f15bd4f7f2f66df4e6bec7535d54f59fee706a7d96cfabbb341127", 0x24, 0xfffffffffffffffd) sendmmsg$sock(0xffffffffffffffff, 0x0, 0x0, 0x20004080) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) 00:39:15 executing program 5: futex(0x0, 0x8b, 0x0, 0x0, 0xffffffffffffffff, 0x0) 00:39:15 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff}, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) shutdown(r1, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 00:39:15 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000480), 0x498002, 0x0) [ 420.799899][ T25] audit: type=1326 audit(1619743154.871:3038409): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 420.822615][T21923] netlink: 1288 bytes leftover after parsing attributes in process `syz-executor.0'. [ 420.878456][ T25] audit: type=1326 audit(1619743154.871:3038410): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 420.907573][ T25] audit: type=1326 audit(1619743154.871:3038411): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 420.933548][ T25] audit: type=1326 audit(1619743154.871:3038412): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 00:39:15 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = socket$inet6(0x10, 0x3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) sendto$inet6(r3, &(0x7f0000000140)="1ba0000016001d0d89fdc5cbdd045798707bed4dca141a780f0f8e", 0xff7f, 0x0, 0x0, 0x0) readv(r3, &(0x7f0000000500)=[{&(0x7f0000000180)=""/98, 0x62}], 0x1) recvfrom$inet6(r3, &(0x7f0000000000)=""/47, 0x2f, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000000)="480500001400", 0x6}], 0x1) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x200000000e26a, 0x0) 00:39:15 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) close(r0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000340), 0x1, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) writev(r0, &(0x7f0000000780)=[{&(0x7f0000000100)="dff548771d77ce8786aca76dda6fb054ab8ea73799d7293eda90ba41a2db81fab55b5415802300a8e64bca2f60e1717f85f06a6bbca90f392b04f34b40db7ffccc33ed6ea82296de9683c9e360851c477304bd8f9bd74d44a4", 0x5}, {&(0x7f0000001340)="f15c93cb35c215fe339d1e9060c5b23e77cb58a87329a00288504db389cc6e395885fa906ac30eeae99fa388c31b5717e641e1586a90961b5f99b26c939d944f6cb1cf6817b7e51402a8459f9db642e97d3c05db56250a665d3ff188eb47e5b036d508aa5a5796fb8806b6a41487e0bfc3df087c18269bd7d2f477104c5d5d", 0x5d}], 0x2) 00:39:15 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) socket$netlink(0x10, 0x3, 0x7) 00:39:15 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)={0x2c, 0x1, 0x2, 0x201, 0x0, 0x0, {0xa}, [@CTA_EXPECT_MASTER={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @dev}}}]}]}, 0x2c}}, 0x0) 00:39:15 executing program 1: open$dir(&(0x7f0000000000)='./file0\x00', 0x2040, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="0800000007ffff"], 0x52) r2 = socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@version_9p2000}]}}) 00:39:15 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000000480)={0x2, {{0x2, 0x0, @multicast2}}, 0x1, 0x1, [{{0x2, 0x0, @loopback}}]}, 0x110) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000000880)={0x2, {{0x2, 0x0, @multicast2}}, 0x1, 0x1, [{{0x2, 0x0, @multicast2}}]}, 0x110) 00:39:15 executing program 5: r0 = memfd_create(&(0x7f0000000500)='+\x8b\x8a\xa9\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x0) write$binfmt_elf64(r0, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) ftruncate(r0, 0x56) 00:39:15 executing program 3: syz_open_dev$tty1(0xc, 0x4, 0x1) 00:39:15 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) close(r0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000340), 0x1, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) writev(r0, &(0x7f0000000780)=[{&(0x7f0000000100)="dff548771d77ce8786aca76dda6fb054ab8ea73799d7293eda90ba41a2db81fab55b5415802300a8e64bca2f60e1717f85f06a6bbca90f392b04f34b40db7ffccc33ed6ea82296de9683c9e360851c477304bd8f9bd74d44a4", 0x5}, {&(0x7f0000001340)="f15c93cb35c215fe339d1e9060c5b23e77cb58a87329a00288504db389cc6e395885fa906ac30eeae99fa388c31b5717e641e1586a90961b5f99b26c939d944f6cb1cf6817b7e51402a8459f9db642e97d3c05db56250a665d3ff188eb47e5b036d508aa5a5796fb8806b6a41487e0bfc3df087c18269bd7d2f477104c5d5d", 0x5d}], 0x2) [ 421.633650][T20276] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=20276 comm=kworker/1:0 [ 421.673784][T21957] netlink: 1288 bytes leftover after parsing attributes in process `syz-executor.0'. 00:39:16 executing program 4: r0 = memfd_create(&(0x7f0000000040)='\x02\x00\x00\x00\x00jiJqv\xdd\x92\x00\x01\x00\x00q\xb8\xe6\n\xe7\xd4\xba!\x11\xfb\xcc}\x00\x00\x00\x00\x06\x8e\x8d(\xd7\x1bixJ\x05\xdd\xb2\xbah2', 0x0) fsetxattr$security_capability(r0, &(0x7f0000000000), &(0x7f0000000080)=@v2, 0x14, 0x0) pwrite64(r0, &(0x7f0000000180)="a9", 0xfdef, 0x0) 00:39:16 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0xdc, &(0x7f0000000140)="c4c691019919da078a0098d1e0a593b440f7629100f06ee04fa4ea57ff22ea97be19af3dcba01419cd2386ad59157689c9c6a47312334c2a97ac2b7f0fb4aabebae8dc5dffbcd48a70502173d6efa56b60f48cf0c9d0f89ecbbfc220bd2b39df9ad8d615b0118297204f526128ca337f0913cc06fdb99bb8c42b17abb4c4d8218ce068c447984f6ec0a384ddcb06a79c79679d573326707aea72d37f0c9067271288c9daeb77e6b7679e178a5df442cba3e35a595542060073af6531f9c273bdcc51561f528a7e85cd1dee0fff19d874c274a19e738345b194179aa3"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x34) 00:39:16 executing program 5: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f0000000000)={0x80, 0x0, 0xc8, 0x8c}) [ 421.700807][T20276] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65380 sclass=netlink_route_socket pid=20276 comm=kworker/1:0 00:39:16 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7ffffffa}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/exe\x00', 0x0, 0x0) fstat(r0, &(0x7f0000000340)) 00:39:16 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',fscache']) 00:39:16 executing program 4: prctl$PR_SET_SECCOMP(0x35, 0x1, 0x0) 00:39:16 executing program 0: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)) clone(0x200300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) openat(0xffffffffffffffff, 0x0, 0x149080, 0x140) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r2, 0x307, 0x0, 0x0, {{0x15}, {@void, @val={0x3}}}}, 0x20}}, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r5, 0x307, 0x0, 0x0, {{0x15}, {@void, @val={0x3}}}}, 0x20}}, 0x0) sendmsg$NL80211_CMD_VENDOR(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000200)={&(0x7f0000000340)={0xf0, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void, @void}}, [@NL80211_ATTR_VENDOR_DATA={0xd1, 0xc5, "6704dd80a9f6f1b48ce4aa4c732e42a32635d77a9027e58b5bbe079765576a9ccefe346ab7d32bf15e0a1c848f08d21bc1b5e692a2cbe1fcd51cb4f1003297a7595db3d1f9e2e5ad1126cfe70a0345c4e90059d0b86c0d990eb53b4c8637ddfe2239e25360031c65e86aa49d8da43a4d1d03b036f9cd7fc768fdd612eee58dfeea23f02168559bc5e941a90f7fc5c079cfed435c1c18621b1bd8e4fc8b5de9bf0693820e3ff29f397900ef11b87f87d6b9c9af581009ff99584eaf48373c99f62d8b537892c006856b6a8e3bda"}, @NL80211_ATTR_VENDOR_ID={0x8, 0xc3, 0x80}]}, 0xf0}, 0x1, 0x0, 0x0, 0x1}, 0x4000) 00:39:16 executing program 3: clone(0x20016406dfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='comm\x00') ppoll(0x0, 0x0, 0x0, 0x0, 0x0) write$tcp_mem(r0, 0x0, 0x0) 00:39:16 executing program 2: set_mempolicy(0x3, &(0x7f0000000000)=0x80000001, 0x5) timer_create(0x0, 0x0, &(0x7f0000000100)) 00:39:16 executing program 5: r0 = syz_io_uring_setup(0x183, &(0x7f00000002c0), &(0x7f00006d5000/0x2000)=nil, &(0x7f00006d6000/0x4000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000100)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x40, &(0x7f0000000140)=0x307e, 0x0, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, &(0x7f0000000640)={0x0, 0x0, 0x0}, 0x0, 0x4048840}, 0x0) io_uring_enter(r0, 0x2a6e, 0x0, 0x0, 0x0, 0x0) 00:39:16 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0xfffffffd}, {0x16}]}) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, 0x0) 00:39:16 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x1f, 0x0, &(0x7f0000004240)) [ 422.501895][T21995] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 422.512043][T21999] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 00:39:16 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0), 0x6, 0x0) write$binfmt_aout(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="00040600fcfeff800000003a4288443e7ff09b5ed7750700feff162d02010800000000000000776075c4171fa31b4f36366194335b71e5fe003b40040000710e13"], 0x41) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000040)=0x6) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "5568c3244a8420560bb625729101611fa07b56"}) 00:39:16 executing program 0: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)) clone(0x200300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) openat(0xffffffffffffffff, 0x0, 0x149080, 0x140) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r2, 0x307, 0x0, 0x0, {{0x15}, {@void, @val={0x3}}}}, 0x20}}, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r5, 0x307, 0x0, 0x0, {{0x15}, {@void, @val={0x3}}}}, 0x20}}, 0x0) sendmsg$NL80211_CMD_VENDOR(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000200)={&(0x7f0000000340)={0xf0, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void, @void}}, [@NL80211_ATTR_VENDOR_DATA={0xd1, 0xc5, "6704dd80a9f6f1b48ce4aa4c732e42a32635d77a9027e58b5bbe079765576a9ccefe346ab7d32bf15e0a1c848f08d21bc1b5e692a2cbe1fcd51cb4f1003297a7595db3d1f9e2e5ad1126cfe70a0345c4e90059d0b86c0d990eb53b4c8637ddfe2239e25360031c65e86aa49d8da43a4d1d03b036f9cd7fc768fdd612eee58dfeea23f02168559bc5e941a90f7fc5c079cfed435c1c18621b1bd8e4fc8b5de9bf0693820e3ff29f397900ef11b87f87d6b9c9af581009ff99584eaf48373c99f62d8b537892c006856b6a8e3bda"}, @NL80211_ATTR_VENDOR_ID={0x8, 0xc3, 0x80}]}, 0xf0}, 0x1, 0x0, 0x0, 0x1}, 0x4000) 00:39:16 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='task\x00') getdents(r0, &(0x7f00000002c0)=""/35, 0x23) getdents(r0, &(0x7f0000000040)=""/66, 0x42) [ 422.550899][T21995] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 422.568485][T22015] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 00:39:16 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, 0x1, 0x1, 0x401, 0x0, 0x0, {}, [@CTA_ZONE={0x6}]}, 0x1c}}, 0x0) 00:39:16 executing program 0: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)) clone(0x200300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) openat(0xffffffffffffffff, 0x0, 0x149080, 0x140) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r2, 0x307, 0x0, 0x0, {{0x15}, {@void, @val={0x3}}}}, 0x20}}, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r5, 0x307, 0x0, 0x0, {{0x15}, {@void, @val={0x3}}}}, 0x20}}, 0x0) sendmsg$NL80211_CMD_VENDOR(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000200)={&(0x7f0000000340)={0xf0, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void, @void}}, [@NL80211_ATTR_VENDOR_DATA={0xd1, 0xc5, "6704dd80a9f6f1b48ce4aa4c732e42a32635d77a9027e58b5bbe079765576a9ccefe346ab7d32bf15e0a1c848f08d21bc1b5e692a2cbe1fcd51cb4f1003297a7595db3d1f9e2e5ad1126cfe70a0345c4e90059d0b86c0d990eb53b4c8637ddfe2239e25360031c65e86aa49d8da43a4d1d03b036f9cd7fc768fdd612eee58dfeea23f02168559bc5e941a90f7fc5c079cfed435c1c18621b1bd8e4fc8b5de9bf0693820e3ff29f397900ef11b87f87d6b9c9af581009ff99584eaf48373c99f62d8b537892c006856b6a8e3bda"}, @NL80211_ATTR_VENDOR_ID={0x8, 0xc3, 0x80}]}, 0xf0}, 0x1, 0x0, 0x0, 0x1}, 0x4000) 00:39:16 executing program 1: r0 = fork() wait4(0x0, 0x0, 0x40000000, 0x0) ptrace(0x10, r0) 00:39:17 executing program 2: set_mempolicy(0x3, &(0x7f00000000c0)=0x81, 0x3fab) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) [ 422.640298][T22026] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 422.662500][T22028] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 00:39:17 executing program 3: unshare(0x2a000400) r0 = open(&(0x7f0000000080)='.\x00', 0x240000, 0x0) ftruncate(r0, 0x0) 00:39:17 executing program 0: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)) clone(0x200300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) openat(0xffffffffffffffff, 0x0, 0x149080, 0x140) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r2, 0x307, 0x0, 0x0, {{0x15}, {@void, @val={0x3}}}}, 0x20}}, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_P2P_DEVICE(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, r5, 0x307, 0x0, 0x0, {{0x15}, {@void, @val={0x3}}}}, 0x20}}, 0x0) sendmsg$NL80211_CMD_VENDOR(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000200)={&(0x7f0000000340)={0xf0, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void, @void}}, [@NL80211_ATTR_VENDOR_DATA={0xd1, 0xc5, "6704dd80a9f6f1b48ce4aa4c732e42a32635d77a9027e58b5bbe079765576a9ccefe346ab7d32bf15e0a1c848f08d21bc1b5e692a2cbe1fcd51cb4f1003297a7595db3d1f9e2e5ad1126cfe70a0345c4e90059d0b86c0d990eb53b4c8637ddfe2239e25360031c65e86aa49d8da43a4d1d03b036f9cd7fc768fdd612eee58dfeea23f02168559bc5e941a90f7fc5c079cfed435c1c18621b1bd8e4fc8b5de9bf0693820e3ff29f397900ef11b87f87d6b9c9af581009ff99584eaf48373c99f62d8b537892c006856b6a8e3bda"}, @NL80211_ATTR_VENDOR_ID={0x8, 0xc3, 0x80}]}, 0xf0}, 0x1, 0x0, 0x0, 0x1}, 0x4000) 00:39:17 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)="ae88bff8240b01005aa6f57f01003aeff0f6b78ef7c8962c22772e108cf41bdd0000fffffffffffffff0227377f8", 0x2e}, {&(0x7f0000000300)="53000000fcffffff060000000200040000009600000000000000a40000000000348a67b68c4cc357f70d748bc0ec6c000000001b1bab0525dcda9f60dd1685812c76d61bd85f96051133e085e09d08b7dc5c1e23926250ec", 0x58}], 0x2) readv(r0, &(0x7f0000000600)=[{&(0x7f00000000c0)=""/227, 0xe3}, {&(0x7f0000001740)=""/207, 0xcf}], 0x2) 00:39:17 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0xfffffffd}, {0x16}]}) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, 0x0) 00:39:17 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCGICOUNT(r0, 0x4b4d, 0x0) 00:39:17 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) recvmmsg(r0, &(0x7f00000019c0)=[{{0x0, 0x0, &(0x7f00000003c0)=[{0x0}, {0x0}, {&(0x7f0000000300)=""/146, 0x92}], 0x3}}], 0x1, 0x0, 0x0) sendmsg$AUDIT_MAKE_EQUIV(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x20, 0x3f7, 0x0, 0x0, 0x0, {0x1, 0x7, '.', './file0'}}, 0x20}}, 0x0) 00:39:17 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net\x00') getdents64(r0, &(0x7f0000000040)=""/27, 0x1b) getdents(r0, 0x0, 0x18) 00:39:17 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick=0x10000, {}, {}, @ext={0xdb, &(0x7f0000000140)="c4c6912d45366bf69e7253d1e0a593b040d762910000000000000022addee07bee0d6333b5cacd2d2c69b618322ff6642022511253508b5a4496728c2a46e1bc340e29b9ab9b7136323e350808ffdb2dbea7410b363de4fb157baa17dacdcffe3510a6ffac32957dc8bb44e203c4b1bc83d8c0b29f75bcf2e34829450c4db583a2d9dd3bf7a0b9daf36c29d2010000004491a4a884fffffffffffffff830843900bb4f0ca8df5ee0fdbb6e3a28ad7f5e20885d0e5a107254d90982724807d7063779151b18fc44a68387277c3f5250f8d50612394bbe718dd9f661"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 00:39:17 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) fremovexattr(r0, &(0x7f0000000040)=@known='system.posix_acl_access\x00') 00:39:17 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x3, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff010}, {0x20, 0x0, 0x0, 0xfffff010}, {0x6}]}, 0x10) sendmmsg(r0, &(0x7f0000006340)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000040)="3a811abd", 0x813a}], 0x1}}], 0x1, 0x0) 00:39:17 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) openat2(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x18) 00:39:17 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000000b00)=[{{&(0x7f0000000040)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x13}}, 0x10, 0x0}}, {{&(0x7f0000000380)={0x2, 0x4e21}, 0x10, 0x0, 0x0, &(0x7f0000000940)=[@ip_retopts={{0x14, 0x0, 0x7, {[@ra={0x94, 0x4, 0x1}]}}}, @ip_retopts={{0x14, 0x0, 0x7, {[@timestamp_addr={0x44, 0x4, 0x47}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x400}}], 0x48}}], 0x2, 0x0) 00:39:17 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) fstat(r0, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0xee00, r1) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891a, &(0x7f0000000c00)={'batadv_slave_1\x00', {0x2, 0x0, @multicast2}}) 00:39:17 executing program 2: prctl$PR_SET_SECCOMP(0x2f, 0x3, 0x0) 00:39:17 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) openat2(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x18) 00:39:18 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0xfffffffd}, {0x16}]}) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, 0x0) 00:39:18 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000000)='configfs\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000002c0)='ext4\x00', &(0x7f0000000740)='./file0\x00', 0x0, 0x0, 0x0, 0x60, &(0x7f0000002f00)={[], [{@context={'context', 0x3d, 'root'}}, {@context={'context', 0x3d, 'root'}}]}) 00:39:18 executing program 2: r0 = fork() process_vm_readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000140)=""/238, 0xee}], 0x206, &(0x7f0000000880)=[{&(0x7f0000000240)=""/111, 0x200001af}, {0x0}, {0x0}], 0x3, 0x0) 00:39:18 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) openat2(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x18) [ 424.437235][T22128] SELinux: duplicate or incompatible mount options [ 424.470405][T22133] SELinux: duplicate or incompatible mount options [ 425.580026][ T25] kauditd_printk_skb: 82553 callbacks suppressed [ 425.580037][ T25] audit: type=1326 audit(1619743159.872:3120966): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 425.616811][ T25] audit: type=1326 audit(1619743159.882:3120967): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 425.641475][ T25] audit: type=1326 audit(1619743159.882:3120968): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 425.666248][ T25] audit: type=1326 audit(1619743159.882:3120969): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 425.690825][ T25] audit: type=1326 audit(1619743159.882:3120970): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 425.715797][ T25] audit: type=1326 audit(1619743159.882:3120971): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 425.742937][ T25] audit: type=1326 audit(1619743159.882:3120972): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 425.768141][ T25] audit: type=1326 audit(1619743159.882:3120973): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 425.795430][ T25] audit: type=1326 audit(1619743159.882:3120974): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 425.819780][ T25] audit: type=1326 audit(1619743159.882:3120975): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 00:39:20 executing program 5: mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x30, 0xffffffffffffffff, 0x10000000) 00:39:20 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$NL80211_CMD_EXTERNAL_AUTH(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x28, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) 00:39:20 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) openat2(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x18) 00:39:20 executing program 0: writev(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000080)="3900000013000347", 0x8}], 0x1) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$AUDIT_USER_AVC(r0, &(0x7f0000001140)={0x0, 0x0, &(0x7f00000010c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="180000006a"], 0x18}}, 0x0) 00:39:20 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, 0x0, 0xffffffffffffff3e) 00:39:20 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0x25, 0x0, 0x0, 0xfffffffd}, {0x16}]}) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, 0x0) 00:39:20 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$NL80211_CMD_EXTERNAL_AUTH(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x28, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) 00:39:20 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@updsa={0x120, 0x1a, 0x1, 0x0, 0x0, {{@in=@private, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}, {@in=@remote, 0x0, 0x2b}, @in6=@dev, {}, {}, {}, 0x0, 0x0, 0x2}, [@coaddr={0x14, 0xe, @in=@multicast2}, @replay_esn_val={0x1c}]}, 0x120}}, 0x0) 00:39:20 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000040)) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x3ff, 0x0, "00200030000009d7001ce1ffffffff6382ece9"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f00000000c0)={0xfff, 0x0, 0x0, 0x0, 0x0, "000800230000000010ff72edc3cf120000ffff"}) 00:39:20 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x20, 0x0, 0x2, 0x5, 0x0, 0x0, {0xa}, [@CTA_EXPECT_MASTER={0x4}, @CTA_EXPECT_MASK={0x4}, @CTA_EXPECT_TUPLE={0x4}]}, 0x20}}, 0x0) 00:39:20 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x7fffff7a}]}) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x69, &(0x7f0000000180)="c4c691019919da078a0098d1e0a593b040f762e16cf51f9f670ed273910000000000000022addee07bee0d6333b5cacd893169b618322ff6602022511253508b5a4496728c2a46e1bc340e29b9ab9b7136283e350808ffdb2dbea7410b363de4fb357baa16da362d42"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x40) 00:39:20 executing program 2: r0 = io_uring_setup(0x5b4, &(0x7f0000000000)) io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r0, 0xa, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r0, 0xa, 0x0, 0x0) 00:39:20 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$NL80211_CMD_EXTERNAL_AUTH(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x28, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) 00:39:20 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000001400)={0x1, &(0x7f00000013c0)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) flistxattr(r0, 0x0, 0x0) 00:39:20 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r3 = socket(0x400000000000010, 0x3, 0x0) write(r3, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(r2, 0x0, 0x6, &(0x7f00000006c0)={@empty=0x8, @empty}, 0x4) 00:39:20 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1000002, 0x12, r2, 0x0) ustat(0x5, &(0x7f0000000000)) 00:39:20 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$NL80211_CMD_EXTERNAL_AUTH(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x28, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) 00:39:21 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f00000001c0)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000f, 0x12, r0, 0x0) mmap(&(0x7f00002b9000/0xc00000)=nil, 0xc00000, 0x100000f, 0x8012, r0, 0x0) 00:39:21 executing program 2: move_pages(0x0, 0x1, &(0x7f0000000000)=[&(0x7f0000ffd000/0x3000)=nil], &(0x7f00000020c0), &(0x7f0000002100), 0x0) 00:39:21 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x8ec3, 0x0) timer_create(0x0, &(0x7f0000000500)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) vmsplice(r1, &(0x7f0000000280)=[{&(0x7f0000000140)="13", 0x1}], 0x1, 0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 00:39:21 executing program 4: r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) read(r0, &(0x7f0000000740)=""/384, 0x200008c0) signalfd(r0, &(0x7f00000000c0)={[0xfff]}, 0x8) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 00:39:21 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r3 = socket(0x400000000000010, 0x3, 0x0) write(r3, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(r2, 0x0, 0x6, &(0x7f00000006c0)={@empty=0x8, @empty}, 0x4) 00:39:21 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r3 = socket(0x400000000000010, 0x3, 0x0) write(r3, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(r2, 0x0, 0x6, &(0x7f00000006c0)={@empty=0x8, @empty}, 0x4) 00:39:21 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x46, &(0x7f0000000240)=0x9, 0x4) sendmmsg$inet6(r0, &(0x7f0000000700)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000780)=[@dstopts={{0x18}}, @pktinfo={{0x24, 0x29, 0x32, {@private0}}}], 0x40}}], 0x2, 0x0) 00:39:21 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r3 = socket(0x400000000000010, 0x3, 0x0) write(r3, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(r2, 0x0, 0x6, &(0x7f00000006c0)={@empty=0x8, @empty}, 0x4) 00:39:21 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r3 = socket(0x400000000000010, 0x3, 0x0) write(r3, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(r2, 0x0, 0x6, &(0x7f00000006c0)={@empty=0x8, @empty}, 0x4) 00:39:21 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000440)="66530700f4e4bb5d284b1bfff147a8378f364602812c66538d750f6ee1d001f43f0500bb9fb045f2d1eaa302ab6c2fef2308003ea1315b9532f3af2f5e153eb78020fa00eb298802d8f6c1f3b18d6d352507f7010b31a53bad1ec3533c791a753a1fef2c560001000000000000fb8005128e7e4d939955f8ac396203784000400f", 0x81}], 0x4, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x34) ptrace$cont(0x18, r1, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1}, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) exit_group(0x0) 00:39:21 executing program 2: unshare(0x8000000) r0 = mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000040)={0x0, 0x1, 0x3}) mq_getsetattr(r0, &(0x7f0000000300)={0x800}, 0x0) mq_timedsend(r0, 0x0, 0x0, 0x0, 0x0) mq_timedsend(r0, 0x0, 0x0, 0x0, 0x0) 00:39:21 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r3 = socket(0x400000000000010, 0x3, 0x0) write(r3, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(r2, 0x0, 0x6, &(0x7f00000006c0)={@empty=0x8, @empty}, 0x4) 00:39:21 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r3 = socket(0x400000000000010, 0x3, 0x0) write(r3, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) setsockopt$inet_mreqn(r2, 0x0, 0x6, &(0x7f00000006c0)={@empty=0x8, @empty}, 0x4) 00:39:21 executing program 4: r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) read(r0, &(0x7f0000000740)=""/384, 0x200008c0) signalfd(r0, &(0x7f00000000c0)={[0xfff]}, 0x8) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 00:39:22 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x8ec3, 0x0) timer_create(0x0, &(0x7f0000000500)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) vmsplice(r1, &(0x7f0000000280)=[{&(0x7f0000000140)="13", 0x1}], 0x1, 0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 00:39:22 executing program 0: set_mempolicy(0x1, &(0x7f0000000200)=0x5, 0x6) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)=0x2) read(r1, 0x0, 0x2000) dup3(r1, r0, 0x0) 00:39:22 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x9, 0x6, 0x67}}) 00:39:22 executing program 2: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000240)="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", 0x10b}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x4a}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 00:39:22 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x85, &(0x7f0000000440)="c4c6912d45366bf69e7253d1e0a593b040d762910000000000000022addee07bee0d6333b5cacd893169b618322ff6602022511253508b5a4496728c2a46e1bc340e29b9ab9b7136323e350808ffdb2dbea7410b363de4fb157baa17dacdcffe3510a6ffac32957dc8bb44e203c4b1bc83d8c0b29f75bcf2e34829450c4db583a2d9dd3bf7"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 00:39:22 executing program 4: r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) read(r0, &(0x7f0000000740)=""/384, 0x200008c0) signalfd(r0, &(0x7f00000000c0)={[0xfff]}, 0x8) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 00:39:22 executing program 1: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000000c0)=0x20001, 0x10270) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x20, &(0x7f0000000040)=0x2, 0xf6) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000100)={@in, 0x0, 0x7, 0x19}, 0xd8) 00:39:22 executing program 2: unshare(0x40000400) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000100)={'filter\x00', 0x18030000}, 0x0) r0 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000080)='./file1\x00', 0x40000000, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0}], 0x0, &(0x7f0000000100)={[{@iocharset={'iocharset', 0x3d, 'cp932'}}]}) mkdirat(r0, &(0x7f0000000140)='./file1\x00', 0x0) 00:39:22 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x6, &(0x7f0000000040)={0x14, {{0x29, 0x0, 0x43000000, @local}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}}}, 0x133) [ 428.372379][T22263] serio: Serial port pts0 00:39:22 executing program 0: set_mempolicy(0x1, &(0x7f0000000200)=0x5, 0x6) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)=0x2) read(r1, 0x0, 0x2000) dup3(r1, r0, 0x0) [ 428.431415][T22263] serio: Serial port pts0 00:39:22 executing program 1: set_mempolicy(0x1, &(0x7f0000000200)=0x5, 0x6) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)=0x2) read(r1, 0x0, 0x2000) dup3(r1, r0, 0x0) 00:39:22 executing program 4: r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) read(r0, &(0x7f0000000740)=""/384, 0x200008c0) signalfd(r0, &(0x7f00000000c0)={[0xfff]}, 0x8) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 428.459959][T22292] loop2: detected capacity change from 0 to 264192 [ 428.516956][T22307] serio: Serial port pts0 [ 428.526440][T22292] FAT-fs (loop2): IO charset cp932 not found 00:39:23 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x8ec3, 0x0) timer_create(0x0, &(0x7f0000000500)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) vmsplice(r1, &(0x7f0000000280)=[{&(0x7f0000000140)="13", 0x1}], 0x1, 0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 00:39:23 executing program 1: set_mempolicy(0x1, &(0x7f0000000200)=0x5, 0x6) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)=0x2) read(r1, 0x0, 0x2000) dup3(r1, r0, 0x0) 00:39:23 executing program 0: set_mempolicy(0x1, &(0x7f0000000200)=0x5, 0x6) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)=0x2) read(r1, 0x0, 0x2000) dup3(r1, r0, 0x0) 00:39:23 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x201608, 0x0, 0x0, 0x0) [ 429.238077][T22337] serio: Serial port pts0 [ 430.589592][ T25] kauditd_printk_skb: 88709 callbacks suppressed [ 430.589604][ T25] audit: type=1326 audit(1619743164.872:3209685): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 430.626336][ T25] audit: type=1326 audit(1619743164.872:3209686): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 430.652947][ T25] audit: type=1326 audit(1619743164.882:3209687): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 430.678377][ T25] audit: type=1326 audit(1619743164.882:3209688): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 430.703582][ T25] audit: type=1326 audit(1619743164.882:3209689): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 430.729075][ T25] audit: type=1326 audit(1619743164.882:3209690): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 430.756274][ T25] audit: type=1326 audit(1619743164.882:3209691): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 430.781335][ T25] audit: type=1326 audit(1619743164.882:3209692): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 430.806697][ T25] audit: type=1326 audit(1619743164.882:3209693): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 430.831478][ T25] audit: type=1326 audit(1619743164.882:3209694): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 00:39:25 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) remap_file_pages(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) 00:39:25 executing program 2: unshare(0x40000400) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000100)={'filter\x00', 0x18030000}, 0x0) r0 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000080)='./file1\x00', 0x40000000, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0}], 0x0, &(0x7f0000000100)={[{@iocharset={'iocharset', 0x3d, 'cp932'}}]}) mkdirat(r0, &(0x7f0000000140)='./file1\x00', 0x0) 00:39:25 executing program 1: set_mempolicy(0x1, &(0x7f0000000200)=0x5, 0x6) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)=0x2) read(r1, 0x0, 0x2000) dup3(r1, r0, 0x0) 00:39:25 executing program 4: r0 = socket$inet(0x10, 0x80003, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="24000000680007041dfffd946f610500020000e8fe0208010c000b0008000e000400ff7e", 0x24}], 0x1}, 0x0) 00:39:25 executing program 0: set_mempolicy(0x1, &(0x7f0000000200)=0x5, 0x6) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)=0x2) read(r1, 0x0, 0x2000) dup3(r1, r0, 0x0) 00:39:25 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x8ec3, 0x0) timer_create(0x0, &(0x7f0000000500)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) vmsplice(r1, &(0x7f0000000280)=[{&(0x7f0000000140)="13", 0x1}], 0x1, 0x0) timer_settime(r3, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 00:39:25 executing program 3: set_mempolicy(0x1, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x1c, r1, 0xbef9a471d584341, 0x0, 0x0, {{0x32}, {@void, @val={0x8, 0x117}, @void}}}, 0x1c}, 0x1, 0x4000000000000000}, 0x0) 00:39:25 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = socket$unix(0x1, 0x2, 0x0) connect$unix(r1, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r1, &(0x7f0000002dc0), 0x40000000000024a, 0x20000054) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) dup2(r2, r0) [ 431.408688][T22360] serio: Serial port pts0 00:39:25 executing program 4: set_mempolicy(0x1, &(0x7f0000000040)=0x9433, 0x25) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000001c0)=ANY=[]) 00:39:25 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x2f606557d6081b8a, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000"}) write$binfmt_aout(r1, &(0x7f00000002c0)=ANY=[], 0x8d) ioctl$TCSETA(r1, 0x5406, &(0x7f00000004c0)={0xfff9, 0x0, 0x0, 0xbffa, 0x0, "078cf0251c0e00"}) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETSF(r2, 0x5412, &(0x7f0000000100)={0x25, 0x0, 0x0, 0x0, 0x0, "000000001000000000000010000000001000"}) 00:39:25 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/33, 0x21}, {&(0x7f0000000400)=""/21, 0x15}], 0x51, 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) [ 431.475825][T22362] loop2: detected capacity change from 0 to 264192 00:39:25 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = socket$unix(0x1, 0x2, 0x0) connect$unix(r1, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r1, &(0x7f0000002dc0), 0x40000000000024a, 0x20000054) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) dup2(r2, r0) 00:39:25 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = socket$unix(0x1, 0x2, 0x0) connect$unix(r1, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r1, &(0x7f0000002dc0), 0x40000000000024a, 0x20000054) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) dup2(r2, r0) [ 431.540273][T22392] loop4: detected capacity change from 0 to 512 [ 431.569616][T22362] FAT-fs (loop2): IO charset cp932 not found 00:39:25 executing program 2: unshare(0x40000400) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000100)={'filter\x00', 0x18030000}, 0x0) r0 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000080)='./file1\x00', 0x40000000, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0}], 0x0, &(0x7f0000000100)={[{@iocharset={'iocharset', 0x3d, 'cp932'}}]}) mkdirat(r0, &(0x7f0000000140)='./file1\x00', 0x0) 00:39:25 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/33, 0x21}, {&(0x7f0000000400)=""/21, 0x15}], 0x51, 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) 00:39:25 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = socket$unix(0x1, 0x2, 0x0) connect$unix(r1, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r1, &(0x7f0000002dc0), 0x40000000000024a, 0x20000054) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) dup2(r2, r0) [ 431.618818][T22392] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 00:39:25 executing program 4: set_mempolicy(0x1, &(0x7f0000000040)=0x9433, 0x25) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000001c0)=ANY=[]) [ 431.726883][T22418] loop2: detected capacity change from 0 to 264192 [ 431.779755][T22430] loop4: detected capacity change from 0 to 512 [ 431.792244][T22418] FAT-fs (loop2): IO charset cp932 not found [ 431.805543][T22430] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 00:39:26 executing program 2: unshare(0x40000400) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000100)={'filter\x00', 0x18030000}, 0x0) r0 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000080)='./file1\x00', 0x40000000, 0x2, &(0x7f00000002c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {0x0}], 0x0, &(0x7f0000000100)={[{@iocharset={'iocharset', 0x3d, 'cp932'}}]}) mkdirat(r0, &(0x7f0000000140)='./file1\x00', 0x0) 00:39:26 executing program 1: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = socket$unix(0x1, 0x2, 0x0) connect$unix(r1, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r1, &(0x7f0000002dc0), 0x40000000000024a, 0x20000054) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) dup2(r2, r0) 00:39:26 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = socket$unix(0x1, 0x2, 0x0) connect$unix(r1, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r1, &(0x7f0000002dc0), 0x40000000000024a, 0x20000054) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) dup2(r2, r0) 00:39:26 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/33, 0x21}, {&(0x7f0000000400)=""/21, 0x15}], 0x51, 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) 00:39:26 executing program 4: set_mempolicy(0x1, &(0x7f0000000040)=0x9433, 0x25) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000001c0)=ANY=[]) 00:39:26 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = socket$unix(0x1, 0x2, 0x0) connect$unix(r1, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r1, &(0x7f0000002dc0), 0x40000000000024a, 0x20000054) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) dup2(r2, r0) 00:39:26 executing program 3: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = socket$unix(0x1, 0x2, 0x0) connect$unix(r1, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r1, &(0x7f0000002dc0), 0x40000000000024a, 0x20000054) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) dup2(r2, r0) [ 432.268577][T22458] loop4: detected capacity change from 0 to 512 [ 432.294640][T22461] loop2: detected capacity change from 0 to 264192 00:39:26 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x20}, {0x45, 0x0, 0x0, 0xfffffffc}, {0x6}]}) creat(0x0, 0x0) 00:39:26 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000440)=[{&(0x7f00000000c0)=""/33, 0x21}, {&(0x7f0000000400)=""/21, 0x15}], 0x51, 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) 00:39:26 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = socket$unix(0x1, 0x2, 0x0) connect$unix(r1, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r1, &(0x7f0000002dc0), 0x40000000000024a, 0x20000054) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) dup2(r2, r0) [ 432.325625][T22458] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 00:39:26 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = socket$unix(0x1, 0x2, 0x0) connect$unix(r1, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r1, &(0x7f0000002dc0), 0x40000000000024a, 0x20000054) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) dup2(r2, r0) [ 432.393124][T22461] FAT-fs (loop2): IO charset cp932 not found 00:39:26 executing program 3: r0 = gettid() r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r1, &(0x7f0000000080)=""/238, 0xee) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000040)={0xa9}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r1, 0xc0105303, &(0x7f0000000180)={{}, 'port0\x00'}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) close(r1) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) tkill(r0, 0x7) 00:39:26 executing program 5: set_mempolicy(0x8001, &(0x7f0000000080)=0x1, 0x1f38) timerfd_create(0x9, 0x0) 00:39:26 executing program 2: socket$packet(0x11, 0xa, 0x300) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x3, @broadcast}, 0x10) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x2000072c, &(0x7f0000deaff0)={0x2, 0x3}, 0x10) 00:39:26 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x2, &(0x7f0000000080)=[{0x25}, {0x6}]}) 00:39:26 executing program 4: set_mempolicy(0x1, &(0x7f0000000040)=0x9433, 0x25) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x1000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f00000001c0)=ANY=[]) 00:39:26 executing program 5: r0 = syz_io_uring_setup(0x2de5, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000400000/0xc00000)=nil, &(0x7f0000000700)=0x0, &(0x7f0000000a00)=0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_SEND={0x1a, 0x0, 0x0, r3, 0x0, 0x0}, 0x0) io_uring_enter(r0, 0xa2, 0x0, 0x0, 0x0, 0x0) 00:39:26 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, 0x0, 0x0) ioctl$BTRFS_IOC_SET_FEATURES(0xffffffffffffffff, 0x40309439, &(0x7f0000000180)={0x3, 0x1}) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_START_ATOMIC_WRITE(0xffffffffffffffff, 0xf501, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='fd/3\x00') preadv(r1, &(0x7f00000017c0), 0x1b5, 0x0, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000080)={@local, @multicast1}, 0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000010400)="ffff0f00fcff0f00000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x372}, {&(0x7f0000011700)='\x00'/15, 0xf, 0x4fe0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000580)={[{@resgid}, {@norecovery}, {@nojournal_checksum}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x2000000}}, {@jqfmt_vfsv0}, {@bh}, {@noquota}]}) r2 = perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r3 = dup2(r2, 0xffffffffffffffff) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90, 0x3, 0xfffffffd, 0xb, 0x0, 0x0, 0xfffe}, 0x0, 0xfffffffdffffffff, r3, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') [ 432.595737][T22506] loop4: detected capacity change from 0 to 512 [ 432.617382][T22506] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. 00:39:27 executing program 3: prlimit64(0x0, 0x8, &(0x7f00000002c0), 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000000), 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) dup2(r0, r1) mmap(&(0x7f0000200000/0x400000)=nil, 0x400002, 0x0, 0x2011, r1, 0x0) [ 432.727309][T22527] loop2: detected capacity change from 0 to 512 [ 432.773784][T22527] EXT4-fs (loop2): Ignoring removed bh option [ 432.810411][T22527] EXT4-fs (loop2): mounted filesystem without journal. Opts: resgid=0x0000000000000000,norecovery,nojournal_checksum,inode_readahead_blks=0x0000000002000000,jqfmt=vfsv0,bh,noquota,,errors=continue. Quota mode: none. [ 432.832327][T22527] ext4 filesystem being mounted at /root/syzkaller-testdir931919513/syzkaller.HiZohi/406/file0 supports timestamps until 2038 (0x7fffffff) [ 432.846895][T22545] device lo entered promiscuous mode [ 432.864230][T22527] EXT4-fs error (device loop2): ext4_validate_inode_bitmap:106: comm syz-executor.2: Corrupt inode bitmap - block_group = 0, inode_bitmap = 20 00:39:27 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x1, &(0x7f0000000140)=0x0) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000000)={0x50, 0x0, 0x0, 0x0, 0x0, {0x3}, [@TIPC_NLA_BEARER={0x3c, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x0, @loopback}}, {0x20, 0x2, @in6={0xa, 0x0, 0x0, @mcast1}}}}]}]}, 0x50}}, 0x0) io_submit(r1, 0x2000031b, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) 00:39:27 executing program 5: r0 = socket$inet(0x2, 0x3, 0xff) setsockopt$inet_mreqsrc(r0, 0x0, 0x26, &(0x7f0000001500)={@remote, @rand_addr, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) 00:39:27 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000500)="66530700ae897094e71b0fa1f147a8378f364602266c2bc1385c3115cc21621df4cb634fc5839e43e9e4ff4aef1d034eedc5070619751168f96548fe93dfe6a852223ef06f183932aff68ca51e2949d5f17b2c23f67a20ab111d943449ee0b06419e0b76089fd805000000000000009e809f9ac9ed879a381648df83d332763c97be94208b1a519de3cd1eae2ebe7dc917d22080572ac8f47c6cd19f3bcfd7831ed80e0d17eee3b96d80c9d6c9667e9514805e096333a8592569ade3fcc3e6987245fdda73ed4d9b64ce048f22666ee03627ae4a0268256391ada5c968dda6b2b0e66fb30e42a843c13cde79b9556d", 0xef}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1e) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x7) 00:39:27 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt(r0, 0xff, 0x0, 0x0, 0x0) 00:39:27 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) close_range(r0, 0xffffffffffffffff, 0x2) accept4$inet6(r1, 0x0, 0x0, 0x0) 00:39:27 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, 0x0, 0x0) ioctl$BTRFS_IOC_SET_FEATURES(0xffffffffffffffff, 0x40309439, &(0x7f0000000180)={0x3, 0x1}) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_START_ATOMIC_WRITE(0xffffffffffffffff, 0xf501, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='fd/3\x00') preadv(r1, &(0x7f00000017c0), 0x1b5, 0x0, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000080)={@local, @multicast1}, 0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000010400)="ffff0f00fcff0f00000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x372}, {&(0x7f0000011700)='\x00'/15, 0xf, 0x4fe0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000580)={[{@resgid}, {@norecovery}, {@nojournal_checksum}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x2000000}}, {@jqfmt_vfsv0}, {@bh}, {@noquota}]}) r2 = perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r3 = dup2(r2, 0xffffffffffffffff) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90, 0x3, 0xfffffffd, 0xb, 0x0, 0x0, 0xfffe}, 0x0, 0xfffffffdffffffff, r3, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') 00:39:27 executing program 5: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x123402) writev(r1, &(0x7f0000000040)=[{&(0x7f0000000240)="53000000fcffffff0200000002000400b8c2d4fffd1ed31723c2f92c657296a3458a9a45f62e270000a40000000000348a67b68c4cc357ec6c000000001b1bab0525dcda9f60020000002c76d61bd85f96051133e085e09d", 0x58}], 0x1) ppoll(&(0x7f0000000100)=[{r0}, {r1}], 0x2, 0x0, 0x0, 0x0) 00:39:27 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, r0, 0x0) r1 = gettid() process_vm_writev(r1, &(0x7f0000c22000)=[{&(0x7f0000000240)=""/102378, 0x18fea}], 0x1, &(0x7f00000193c0)=[{&(0x7f00000000c0)=""/89, 0x2001922a}], 0x1, 0x0) [ 433.291614][T22562] loop2: detected capacity change from 0 to 512 [ 433.309298][T22562] EXT4-fs (loop2): Ignoring removed bh option 00:39:27 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, &(0x7f0000000300)={'HL\x00'}, &(0x7f0000000340)=0x1e) 00:39:27 executing program 4: r0 = socket(0x2, 0x3, 0x8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'lo\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="4b00000014"]}) 00:39:27 executing program 0: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000180)={0x4000}, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000440)={0x2c, 0x16, 0xa01, 0x0, 0x0, {0xa}, [@nested={0x4}, @nested={0x14, 0x2, 0x0, 0x1, [@generic="1221679be8aa67c9553bf6b27fbbd3bb"]}]}, 0x2c}}, 0x0) 00:39:27 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) r1 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r1, 0x0, 0x16, 0x0, 0x0) 00:39:27 executing program 4: r0 = socket(0x2, 0x3, 0x8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'lo\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="4b00000014"]}) [ 433.408655][T22562] EXT4-fs (loop2): mounted filesystem without journal. Opts: resgid=0x0000000000000000,norecovery,nojournal_checksum,inode_readahead_blks=0x0000000002000000,jqfmt=vfsv0,bh,noquota,,errors=continue. Quota mode: none. 00:39:27 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) r1 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r1, 0x0, 0x16, 0x0, 0x0) 00:39:27 executing program 1: setresuid(0xee00, 0xee01, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bind$unix(r0, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) 00:39:27 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) r1 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r1, 0x0, 0x16, 0x0, 0x0) 00:39:27 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000380)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x32}, @in=@multicast2, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_auth={0x48, 0x1, {{'sha512-ce\x00'}}}]}, 0x138}}, 0x0) [ 433.584055][T22562] ext4 filesystem being mounted at /root/syzkaller-testdir931919513/syzkaller.HiZohi/407/file0 supports timestamps until 2038 (0x7fffffff) 00:39:27 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, 0x0, 0x0) ioctl$BTRFS_IOC_SET_FEATURES(0xffffffffffffffff, 0x40309439, &(0x7f0000000180)={0x3, 0x1}) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_START_ATOMIC_WRITE(0xffffffffffffffff, 0xf501, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='fd/3\x00') preadv(r1, &(0x7f00000017c0), 0x1b5, 0x0, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000080)={@local, @multicast1}, 0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000010400)="ffff0f00fcff0f00000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x372}, {&(0x7f0000011700)='\x00'/15, 0xf, 0x4fe0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000580)={[{@resgid}, {@norecovery}, {@nojournal_checksum}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x2000000}}, {@jqfmt_vfsv0}, {@bh}, {@noquota}]}) r2 = perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r3 = dup2(r2, 0xffffffffffffffff) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90, 0x3, 0xfffffffd, 0xb, 0x0, 0x0, 0xfffe}, 0x0, 0xfffffffdffffffff, r3, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') 00:39:27 executing program 3: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x13b, &(0x7f0000000240)="c4c691019919da078a00ff387082f7d698d1e0a593b040f762910000000000000022addee07bee0d6333b5cacd893169b618322ff6602022511253508b5a4496728c2a46e1bc340e29b9ab9b7136283e350808ffdb2dbea7410b363de4fb357baa17dacdcfac32957dc8bb44e203c4b1bc83d8c0b29f75bcf2e3482945fef116371f8c8c0c4db583a208718e3cccd9dd3bf7a0b9daf36c29d2010000004a91a4a884fffffffffffffff830843900bb4ff9a7df5ee0fdbb6e3a288594f90399ef71d1fa7b32513f49d5135af1235f80005999dd604f5f3bd40ec03ea54e2eabc33f000000000000005323ef9a1d22235beedc1b855ef9a0aaa83d36ae867669f8f2dd7d6c66d34619d0820f077e0be84af6885c0cb9d73f048156feface7d38e522918ca0144572755354f55a99e97184463c81c3ead2e6169ed4ed"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x17) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() tkill(r1, 0x40) 00:39:27 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x0) select(0x40, &(0x7f0000000080), &(0x7f0000000100)={0x9}, 0x0, 0x0) read$usbmon(r0, &(0x7f0000000140)=""/124, 0x7c) 00:39:27 executing program 4: r0 = socket(0x2, 0x3, 0x8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'lo\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="4b00000014"]}) 00:39:27 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0), 0x8980, 0x0) sendto$inet6(r1, &(0x7f0000000340)="d30e614c7d603b9f708a6047e6d4bcce2d31f95c6e8337cbf589b162be14516e243ec869dd4c6428ee0e7629e317b79d3e4c3e66812e4ae0b7a3dc68510bd980fb0abc95aac027d16bfacec996f93b547ef281170ae582bc4cecf6a6fc629194aaeb", 0x62, 0x40040, 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x109c01) write$sndseq(r2, &(0x7f0000000040)=[{0xff, 0x0, 0x0, 0x0, @tick, {}, {}, @queue}, {0x0, 0x0, 0x0, 0xfd, @tick, {}, {0x7}, @quote}], 0x38) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f00000000c0)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="03", 0x1, 0x640}, {&(0x7f0000000300)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000012600)="ed41000000100000daf4655fdbf4655fdbf4655f000000000000040080", 0x1d, 0x4400}, {&(0x7f0000012800)="8081000000180000daf4655fdaf4655fdaf4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030", 0x3d, 0x4800}, {&(0x7f0000013900)="111fc0d901000000803a0900803a09000000000006", 0x15, 0x30000}], 0x0, &(0x7f00000000c0)=ANY=[]) chroot(&(0x7f0000000480)='./file0\x00') r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r3, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r4 = socket(0x11, 0x800000003, 0x0) bind(r4, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f00000006c0)={'sit0\x00', &(0x7f00000005c0)=@ethtool_rxnfc={0x2d, 0x12, 0xfffffffffffffffb, {0xa, @esp_ip4_spec={@local, @multicast1, 0x80000001, 0x5}, {0x0, @broadcast, 0x8001, 0x81, [0x843, 0xff]}, @ah_ip6_spec={@empty, @private2, 0xff000000, 0xf9}, {0x0, @random="ac9cc721f16e", 0x1, 0x2, [0xaff0000, 0x79d0abf2]}, 0x10001, 0x6}, 0x3, [0x800, 0xeb8, 0x0]}}) sendmmsg(r3, &(0x7f0000002b40)=[{{&(0x7f0000000080)=@ll={0x11, 0x0, r5, 0x1, 0x0, 0x6, @multicast}, 0x80, 0x0}}], 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000400)={'tunl0\x00', 0x0}) sendmsg$ETHTOOL_MSG_RINGS_GET(r1, &(0x7f0000000580)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x94, 0x0, 0x2, 0x70bd25, 0x25dfdbfe, {}, [@HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6_vti0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_vlan\x00'}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x24000040}, 0x1) umount2(&(0x7f0000000180)='./file0\x00', 0x0) 00:39:27 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) exit_group(0x0) r1 = socket$inet(0x2, 0x840000000003, 0x2) setsockopt$inet_int(r1, 0x0, 0x16, 0x0, 0x0) 00:39:27 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000340)="5500000018007f5f14fe01b2a49b90930206040200101301041614053900090035000c07010000001900164000600055060022dc131a014883139b84134ef75adb83de4411000b00", 0x48}, {&(0x7f0000000000)="00120608000000000000130000", 0xd}], 0x2, 0x0, 0x0, 0xf000000}, 0x0) 00:39:27 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0xe, &(0x7f0000000000), 0x4) 00:39:28 executing program 4: r0 = socket(0x2, 0x3, 0x8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'lo\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="4b00000014"]}) 00:39:28 executing program 5: r0 = syz_open_dev$rtc(&(0x7f0000000200), 0x0, 0x0) ioctl$RTC_EPOCH_SET(r0, 0x4008700e, 0x0) 00:39:28 executing program 1: set_mempolicy(0x2, &(0x7f0000000140)=0x9, 0x1ff) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000440)=@acquire={0x128, 0x17, 0x1, 0x0, 0x0, {{@in6=@remote}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {@in=@private, @in=@remote}, {{@in=@loopback, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2}}}}, 0x128}}, 0x0) 00:39:28 executing program 3: r0 = gettid() r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r1, &(0x7f0000000080)=""/238, 0xee) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000040)={0xa9}) r2 = dup(r1) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc0605345, &(0x7f0000000200)={{}, 'port1\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0x40a85323, &(0x7f0000000340)) tkill(r0, 0x7) [ 433.741194][T22651] loop2: detected capacity change from 0 to 512 [ 433.764705][T22651] EXT4-fs (loop2): Ignoring removed bh option 00:39:28 executing program 2: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, 0x0, 0x0) ioctl$BTRFS_IOC_SET_FEATURES(0xffffffffffffffff, 0x40309439, &(0x7f0000000180)={0x3, 0x1}) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_START_ATOMIC_WRITE(0xffffffffffffffff, 0xf501, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='fd/3\x00') preadv(r1, &(0x7f00000017c0), 0x1b5, 0x0, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000080)={@local, @multicast1}, 0xc) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000010400)="ffff0f00fcff0f00000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x372}, {&(0x7f0000011700)='\x00'/15, 0xf, 0x4fe0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000580)={[{@resgid}, {@norecovery}, {@nojournal_checksum}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x2000000}}, {@jqfmt_vfsv0}, {@bh}, {@noquota}]}) r2 = perf_event_open(&(0x7f0000000380)={0x2, 0x70, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x0, 0xffffffbfffffffff, 0xffffffffffffffff, 0x0) r3 = dup2(r2, 0xffffffffffffffff) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90, 0x3, 0xfffffffd, 0xb, 0x0, 0x0, 0xfffe}, 0x0, 0xfffffffdffffffff, r3, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x410481, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x04\x03\xdc\r') 00:39:28 executing program 4: syz_mount_image$iso9660(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000440)=""/4096, 0x1000) readv(r0, &(0x7f0000000280)=[{&(0x7f0000000140)=""/232, 0xe8}], 0x1) 00:39:28 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x24009045, &(0x7f0000000100), 0x10) getsockopt$sock_buf(r0, 0x1, 0x4, 0x0, &(0x7f0000000040)) 00:39:28 executing program 5: timer_create(0x0, &(0x7f0000000440)={0x0, 0x12}, &(0x7f0000000180)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000380), 0x0, 0x0) ioctl$MON_IOCX_GETX(r1, 0xc0109207, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x3938700}, {0x0, 0x3938700}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) ioctl$MON_IOCG_STATS(r1, 0x9208, 0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 00:39:28 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7ffffffd}]}) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000400)="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", 0x109}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) [ 433.840260][T22651] EXT4-fs (loop2): mounted filesystem without journal. Opts: resgid=0x0000000000000000,norecovery,nojournal_checksum,inode_readahead_blks=0x0000000002000000,jqfmt=vfsv0,bh,noquota,,errors=continue. Quota mode: none. [ 433.865504][T22651] ext4 filesystem being mounted at /root/syzkaller-testdir931919513/syzkaller.HiZohi/408/file0 supports timestamps until 2038 (0x7fffffff) 00:39:28 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee00}}], [], 0x6b}}) 00:39:28 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:39:28 executing program 0: mknod(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001040)={0x2, 0x70, 0x69, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4000008006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit(0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') syz_open_dev$vcsa(&(0x7f0000000040), 0x8, 0x101000) getsockname$unix(0xffffffffffffffff, &(0x7f0000000140), 0x0) sendfile(r0, r1, 0x0, 0x800000080004100) 00:39:28 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_setup(0x7, &(0x7f0000000880)=0x0) io_destroy(r1) 00:39:28 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 434.009003][T22696] loop2: detected capacity change from 0 to 512 00:39:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = socket$netlink(0x10, 0x3, 0x9) bind$netlink(r2, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc) [ 434.032717][T22696] EXT4-fs (loop2): Ignoring removed bh option 00:39:28 executing program 3: r0 = gettid() r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r1, &(0x7f0000000080)=""/238, 0xee) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000040)={0xa9}) r2 = dup(r1) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc0605345, &(0x7f0000000200)={{}, 'port1\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0x40a85323, &(0x7f0000000340)) tkill(r0, 0x7) 00:39:28 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:39:28 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0003}]}) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) name_to_handle_at(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000001c0)=@xfs_parent={0x1c}, &(0x7f0000000280), 0x0) [ 434.051412][T22696] EXT4-fs (loop2): mounted filesystem without journal. Opts: resgid=0x0000000000000000,norecovery,nojournal_checksum,inode_readahead_blks=0x0000000002000000,jqfmt=vfsv0,bh,noquota,,errors=continue. Quota mode: none. 00:39:28 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:39:28 executing program 5: timer_create(0x0, &(0x7f0000000440)={0x0, 0x12}, &(0x7f0000000180)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000380), 0x0, 0x0) ioctl$MON_IOCX_GETX(r1, 0xc0109207, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x3938700}, {0x0, 0x3938700}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) ioctl$MON_IOCG_STATS(r1, 0x9208, 0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 00:39:28 executing program 1: timer_create(0x0, &(0x7f0000000440)={0x0, 0x12}, &(0x7f0000000180)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000380), 0x0, 0x0) ioctl$MON_IOCX_GETX(r1, 0xc0109207, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x3938700}, {0x0, 0x3938700}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) ioctl$MON_IOCG_STATS(r1, 0x9208, 0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 00:39:28 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0003}]}) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) name_to_handle_at(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000001c0)=@xfs_parent={0x1c}, &(0x7f0000000280), 0x0) [ 434.051565][T22696] ext4 filesystem being mounted at /root/syzkaller-testdir931919513/syzkaller.HiZohi/409/file0 supports timestamps until 2038 (0x7fffffff) 00:39:28 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_setup(0x7, &(0x7f0000000880)=0x0) io_destroy(r1) [ 434.053754][T22696] EXT4-fs error (device loop2): ext4_validate_inode_bitmap:106: comm syz-executor.2: Corrupt inode bitmap - block_group = 0, inode_bitmap = 20 00:39:28 executing program 0: mlockall(0x7) mlockall(0x1) mlockall(0x2) mlockall(0x0) 00:39:28 executing program 1: timer_create(0x0, &(0x7f0000000440)={0x0, 0x12}, &(0x7f0000000180)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000380), 0x0, 0x0) ioctl$MON_IOCX_GETX(r1, 0xc0109207, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x3938700}, {0x0, 0x3938700}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) ioctl$MON_IOCG_STATS(r1, 0x9208, 0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 00:39:28 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0003}]}) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) name_to_handle_at(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000001c0)=@xfs_parent={0x1c}, &(0x7f0000000280), 0x0) 00:39:28 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_setup(0x7, &(0x7f0000000880)=0x0) io_destroy(r1) 00:39:28 executing program 3: r0 = gettid() r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r1, &(0x7f0000000080)=""/238, 0xee) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000040)={0xa9}) r2 = dup(r1) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc0605345, &(0x7f0000000200)={{}, 'port1\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0x40a85323, &(0x7f0000000340)) tkill(r0, 0x7) 00:39:28 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0003}]}) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) name_to_handle_at(r0, &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f00000001c0)=@xfs_parent={0x1c}, &(0x7f0000000280), 0x0) 00:39:28 executing program 5: timer_create(0x0, &(0x7f0000000440)={0x0, 0x12}, &(0x7f0000000180)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000380), 0x0, 0x0) ioctl$MON_IOCX_GETX(r1, 0xc0109207, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x3938700}, {0x0, 0x3938700}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) ioctl$MON_IOCG_STATS(r1, 0x9208, 0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 00:39:28 executing program 1: timer_create(0x0, &(0x7f0000000440)={0x0, 0x12}, &(0x7f0000000180)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000380), 0x0, 0x0) ioctl$MON_IOCX_GETX(r1, 0xc0109207, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x3938700}, {0x0, 0x3938700}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) ioctl$MON_IOCG_STATS(r1, 0x9208, 0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 00:39:28 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x60, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_NAT_SRC={0x4}]}, 0x60}}, 0x0) 00:39:28 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_setup(0x7, &(0x7f0000000880)=0x0) io_destroy(r1) 00:39:28 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x7) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r0, r0) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r2, 0x29, 0x37, &(0x7f0000000180)=ANY=[], 0x78) dup2(r1, r0) 00:39:28 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000080)='./file0/file0\x00', 0x0) fcntl$lock(r0, 0x7, &(0x7f00000003c0)={0x1, 0x0, 0x0, 0x0, 0xffffffffffffffff}) chdir(&(0x7f0000000380)='./file0\x00') unlink(&(0x7f0000000340)='./file0\x00') 00:39:29 executing program 0: mlockall(0x7) mlockall(0x1) mlockall(0x2) mlockall(0x0) 00:39:29 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r1 = socket(0x400000000000010, 0x802, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f00000014c0)=0x2) 00:39:29 executing program 2: syz_open_dev$sg(&(0x7f0000000040), 0x0, 0xc8082) 00:39:29 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="d0000000130021000000000000000000fc010000000000000000000000000000fc00000000000000000000000000000000000000000000000200000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c00080004b6"], 0xd0}}, 0x0) 00:39:29 executing program 5: timer_create(0x0, &(0x7f0000000440)={0x0, 0x12}, &(0x7f0000000180)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000380), 0x0, 0x0) ioctl$MON_IOCX_GETX(r1, 0xc0109207, &(0x7f0000000080)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x3938700}, {0x0, 0x3938700}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)=0x0) ioctl$MON_IOCG_STATS(r1, 0x9208, 0x0) timer_settime(r2, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) 00:39:29 executing program 3: r0 = gettid() r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r1, &(0x7f0000000080)=""/238, 0xee) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000040)={0xa9}) r2 = dup(r1) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r2, 0xc0605345, &(0x7f0000000200)={{}, 'port1\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0x40a85323, &(0x7f0000000340)) tkill(r0, 0x7) 00:39:29 executing program 2: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x102440, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x1) open(&(0x7f00009e1000)='./file0\x00', 0x0, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) fcntl$setlease(r0, 0x400, 0x0) 00:39:29 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000001c0)="5500000018007f5f14fe01b2c682c3c40206040200101301021614123900090035000c0201000000190015400400f2ff060022dc131a014883139b84136ef75adb83de441100160031d521e25aa274c71bbe999b19", 0x55}], 0x1, 0x0, 0x0, 0xf000000}, 0x0) [ 435.001395][T22827] __nla_validate_parse: 4 callbacks suppressed [ 435.001458][T22827] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 00:39:29 executing program 4: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x200000005c831, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x2, &(0x7f0000000040)=0xfff, 0xf, 0x3) 00:39:29 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_rdma(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000240)) 00:39:29 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x25, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 00:39:29 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_rdma(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000240)) [ 435.115958][T22851] 9pnet: Could not find request transport: rdma [ 435.183228][T22862] 9pnet: Could not find request transport: rdma 00:39:29 executing program 0: mlockall(0x7) mlockall(0x1) mlockall(0x2) mlockall(0x0) 00:39:29 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_rdma(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000240)) 00:39:29 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) r2 = dup(r0) ioctl$SG_IO(r2, 0x2283, &(0x7f00000025c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 00:39:29 executing program 5: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000b, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) prctl$PR_SET_SECCOMP(0x1b, 0x0, 0x0) 00:39:29 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x128, &(0x7f0000000440)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x34) 00:39:29 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_rdma(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000240)) [ 435.504911][T22877] 9pnet: Could not find request transport: rdma [ 435.540717][T22888] 9pnet: Could not find request transport: rdma [ 435.599239][ T25] kauditd_printk_skb: 58641 callbacks suppressed [ 435.599251][ T25] audit: type=1326 audit(1619743169.882:3268336): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 435.636495][ T25] audit: type=1326 audit(1619743169.892:3268337): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 435.669803][ T25] audit: type=1326 audit(1619743169.892:3268338): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 435.697990][ T25] audit: type=1326 audit(1619743169.892:3268339): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 435.724350][ T25] audit: type=1326 audit(1619743169.892:3268340): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 435.749778][ T25] audit: type=1326 audit(1619743169.892:3268341): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 435.775033][ T25] audit: type=1326 audit(1619743169.892:3268342): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 435.800707][ T25] audit: type=1326 audit(1619743169.892:3268343): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 435.825948][ T25] audit: type=1326 audit(1619743169.892:3268344): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 00:39:30 executing program 2: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x102440, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x1) open(&(0x7f00009e1000)='./file0\x00', 0x0, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) fcntl$setlease(r0, 0x400, 0x0) 00:39:30 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000002c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000000)={0x0, 0x0, 0x1b}) 00:39:30 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r1 = socket(0x2, 0x3, 0x7) sendmmsg$inet(r1, &(0x7f0000001880)=[{{&(0x7f00000012c0)={0x2, 0x0, @private}, 0x10, 0x0}}], 0x1, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f00000000c0)) 00:39:30 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe5}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000780)=[{&(0x7f0000000100)="dff548771d77ce8786aca76dda6fb054ab8ea73799d7293eda90ba41a2db81fab55b5415692300a8e64bca2f60e1717f85f06a6bbca90f392b04f34940db7ffccc33ed6ea82296de9683c9e360cd1c477304bd8f9bd74d44a4c7d1c7e625a8", 0x5f}, {&(0x7f0000001340)="f15c93cb35c215fe339d1e9060c5b23e77cb58a87329a00288504db389cc6e395885fa906ac30eeae99fa388c31b5717e641e1586a90961b5f99b26c939d944f6cb1cf6817b7e51402a8459f9db642e97d3c05db56250a665d3ff188eb47e5b036d508aa5a5796", 0x67}], 0x2) sendto$inet(r0, &(0x7f0000000180)="c1ca1e64ed9bc4e7b09a20485a356f9480a9ab6689c117c77807abc505344ae1217b1f0feeea1483a8af2cd56bf4da859f26f7b0f5ea356a4216a2f85402fcae428d6286d1f2ced47d7c19a7adc1fdff1c08fc8b8e18c5dacac526eed0a21b7afe2345175a1cf5cf45", 0x69, 0x0, 0x0, 0x0) 00:39:30 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000000380)=""/219, 0xdb}], 0x1, 0x0, 0x0) ioctl$MON_IOCQ_RING_SIZE(r0, 0x9205) timer_settime(r1, 0x0, &(0x7f0000000080)={{}, {0x0, 0x989680}}, 0x0) 00:39:30 executing program 0: mlockall(0x7) mlockall(0x1) mlockall(0x2) mlockall(0x0) [ 435.850896][ T25] audit: type=1326 audit(1619743169.892:3268345): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 00:39:30 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x117, &(0x7f0000000140)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x40) 00:39:30 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket(0x10, 0x3, 0x0) write(0xffffffffffffffff, &(0x7f0000000140)="fc0000004a000704ab092500090007000aab80", 0x13) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 00:39:30 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='timerslack_ns\x00') write$char_usb(r0, 0x0, 0xc) 00:39:30 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000002c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000000)={0x0, 0x0, 0x1b}) 00:39:30 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x117, &(0x7f0000000140)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x40) 00:39:30 executing program 1: lsetxattr$system_posix_acl(0x0, 0x0, &(0x7f0000000140)={{}, {}, [{0x2, 0x0, 0xee01}]}, 0x2c, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0xca641) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f00000004c0)={0x0, 0x0, 0x0, 'queue0\x00'}) write$sndseq(r0, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @raw8={"a35704000000b6215dd33459"}}], 0xffffff01) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000040)={0x16, @time}) [ 436.063276][T22943] netlink: 224 bytes leftover after parsing attributes in process `syz-executor.4'. 00:39:31 executing program 2: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x102440, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x1) open(&(0x7f00009e1000)='./file0\x00', 0x0, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) fcntl$setlease(r0, 0x400, 0x0) 00:39:31 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000002c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000000)={0x0, 0x0, 0x1b}) 00:39:31 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x117, &(0x7f0000000140)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x40) 00:39:31 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000140)="66530700ae897094e7b126b097eaa769be6d05c41bd34e677d114b654b499374a8db38f8c44f7b7d9ce423c26f45958dc387cf4c2e1fea4b7a3dfc8ea6a7efefe48dd9e05485b4ff15f715134d82ce9c0952d644157684e3dae491de7642a7c52cc2d523be91b5877341e0e1dc", 0x6d}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000080)="4dc3", 0x2}], 0x1}, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 00:39:31 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) r1 = socket(0x400000000000010, 0x802, 0x0) write(r1, &(0x7f00000000c0)="24000000200099f0003be90000ed190e020008160000100000ba1080080002007f196be0", 0x24) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000100)={{{@in=@private, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x4000000, 0x1}, {{@in=@broadcast}, 0x0, @in6=@local}}, 0xe8) 00:39:31 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @ext={0x117, &(0x7f0000000140)="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"}}], 0x1c) wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x40) 00:39:31 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/tty/ldiscs\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000200)=""/152, 0x98, 0x1e) 00:39:31 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f", 0xf, 0x1000}, {&(0x7f0000010500)="ffff000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000180)) setxattr$trusted_overlay_upper(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000040)=ANY=[], 0xc002, 0x0) 00:39:31 executing program 5: r0 = syz_open_dev$sg(&(0x7f00000002c0), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000000)={0x0, 0x0, 0x1b}) 00:39:31 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000001c0), 0x47e2, 0xa8d01) write$binfmt_misc(r0, &(0x7f0000000000)={'syz1'}, 0x4) 00:39:31 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='autofs\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2c) tkill(r0, 0x4) wait4(0x0, 0x0, 0x0, 0x0) 00:39:31 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000180)="ccb86bfd74707827f0a7e1", 0xb}], 0x3, 0x0, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b7ecb6974f527cc14538d1efb1ffe03284f6d33265be9c604b293f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x2, 0x0) ioctl$KDFONTOP_SET_DEF(0xffffffffffffffff, 0x4b72, &(0x7f00000000c0)={0x2, 0x0, 0x0, 0x0, 0x120, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x17) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = gettid() tkill(r2, 0x22) [ 436.870016][T22978] loop4: detected capacity change from 0 to 512 [ 436.914305][T22978] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 436.947315][T22991] autofs4:pid:22991:autofs_fill_super: called with bogus options [ 436.988882][T22996] autofs4:pid:22996:autofs_fill_super: called with bogus options 00:39:31 executing program 2: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x102440, 0x0) fcntl$setsig(r0, 0xa, 0x11) fcntl$setlease(r0, 0x400, 0x1) open(&(0x7f00009e1000)='./file0\x00', 0x0, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x0) fcntl$setlease(r0, 0x400, 0x0) 00:39:31 executing program 1: unshare(0x40000000) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad:\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') 00:39:31 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x69440, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) 00:39:31 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cgroup.controllers\x00', 0x275a, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) write$cgroup_int(r1, &(0x7f0000000000), 0xffffff6a) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000001300)={0x2880008, r0}) close(r0) 00:39:31 executing program 4: perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10202}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r0, 0x8208200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14117e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000480)={'syztnl2\x00', &(0x7f0000000440)={'syztnl1\x00', 0x0, 0x8, 0x7, 0x3, 0x2d, {{0x7, 0x4, 0x0, 0xb, 0x1c, 0x64, 0x0, 0x1, 0x2f, 0x0, @local, @private=0xa010101, {[@timestamp={0x44, 0x8, 0x64, 0x0, 0x6, [0xa4]}]}}}}}) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r1, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8040000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x54, 0x0, 0x1, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xde00}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x4}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x800}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}]}, 0x54}, 0x1, 0x0, 0x0, 0x20040805}, 0x0) r3 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, r3, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r4, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) r5 = syz_open_pts(r4, 0x0) ioctl$TCSETS(r5, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 'JZ-\x00'}) r6 = dup3(r5, r4, 0x0) vmsplice(r6, &(0x7f00000003c0)=[{&(0x7f0000000000)="cc8c1158a49f85acf60b62842ba9c480a6ed9f26c54f82451d9e4d35fda25e7bebd49afc38b388ca860f205bb16d270c52cb562716ab104681a3c3c9abbd88a84c75ba09d7ed4e669899d430363f161e3ffa5667f3744be896c2f8ea3537700d6520d87abbe15d5eafd152b9f544536c7a39b4d4f06fe6bf95b7d8410c8d92ba593d1652084e4fba88f7791331602c4e74df506bde75a1310a2459c8b8", 0x9d}, {&(0x7f00000000c0)="d78d705105ee3e95c41034e7daf83c649389cf2e79262dc09fbe82eba663d36c80f245534a7d85e287317377ba17ec9edc789be286acfbf1fbdd1f012931174091661d3d7191797f6f76c3358bdb", 0x4e}, {&(0x7f0000000140)="2472e4b220e770314f299d24", 0xc}, {&(0x7f0000000180)="e07f798c9ae3b234d1c87d7b64ea2446854654536179aa686dc367827d01ecef2d49886b080da8b0cd7dee4963ad03ef4591355f011c8c033c71561f563d8a5284a3ec7ed03702e4eed31bdd4f7b74382b485be35a3ba9346c037564678b71825bab5902b2b7418c64d99a14926c54c38de0e457057c", 0x76}, {&(0x7f0000000200)="3c30319c9c33b4dcbd3edf75ab8d8c862487c0480619ca887428dd1bf0eb3fef8b89c899f7dde5e6a77191a0072f2001d42a364911709626406e83a66365c21b73590c98eb9abd4eb4a59f9503e293ab", 0x50}], 0x5, 0x1) mmap(&(0x7f0000000000/0x600000)=nil, 0x600e00, 0x7ffffe, 0x4002011, 0xffffffffffffffff, 0x0) 00:39:31 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='autofs\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2c) tkill(r0, 0x4) wait4(0x0, 0x0, 0x0, 0x0) 00:39:32 executing program 5: kexec_load(0x0, 0x1, &(0x7f0000002440)=[{0x0, 0x0, 0xfffffffffffffc01, 0xfffffffffffffc01}], 0x0) 00:39:32 executing program 1: epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 437.684572][T23028] autofs4:pid:23028:autofs_fill_super: called with bogus options 00:39:32 executing program 5: clock_gettime(0xa, 0x0) 00:39:32 executing program 1: r0 = syz_io_uring_setup(0x2de5, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000400000/0xc00000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_SENDMSG={0x9, 0x4, 0x0, r3, 0x0, &(0x7f0000000200)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x159a, 0x0, 0x0, 0x0, 0x0) io_uring_enter(r0, 0x302, 0x0, 0x0, 0x0, 0x0) 00:39:32 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/ip_mr_vif\x00') preadv(r0, &(0x7f0000000180)=[{&(0x7f0000000480)=""/228, 0xe4}], 0x1, 0x0, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f00000003c0)=""/125, 0x7d}], 0x1, 0x80, 0x0) 00:39:32 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) writev(r1, &(0x7f0000001400)=[{0x0}, {&(0x7f0000000340)='[', 0x1}, {&(0x7f00000013c0)="e1", 0x1}], 0x3) 00:39:32 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='pvfs2\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x5) wait4(0x0, 0x0, 0x0, 0x0) 00:39:32 executing program 1: r0 = syz_io_uring_setup(0x2de5, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000400000/0xc00000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_SENDMSG={0x9, 0x4, 0x0, r3, 0x0, &(0x7f0000000200)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x159a, 0x0, 0x0, 0x0, 0x0) io_uring_enter(r0, 0x302, 0x0, 0x0, 0x0, 0x0) 00:39:32 executing program 0: r0 = syz_io_uring_setup(0x2de5, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000400000/0xc00000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_SENDMSG={0x9, 0x4, 0x0, r3, 0x0, &(0x7f0000000200)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x159a, 0x0, 0x0, 0x0, 0x0) io_uring_enter(r0, 0x302, 0x0, 0x0, 0x0, 0x0) 00:39:32 executing program 2: capset(&(0x7f0000000080)={0x20080522}, &(0x7f0000000040)) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="66530700ae897094d2f055de8098ab5bfbe42829a773c0c9605aa0bba5fd63343239d4a279d31a0c5f2386191c7aee3115ef0441c40671bec467d4182e6eb56585656007a1062c4b64862cff00b01e1855ef88b9bbcea40f6c48488c8762237c7af3ebec1a3384b97d5b84e2564247dc404526435ddb1097cbe79d07897410994562e84d979e4ae0f0ef1497c0c28f825151c839e588f4b82812c177b072ab3f4aa94476189206d6cac5", 0xaa}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x34) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) exit_group(0x0) 00:39:32 executing program 4: perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10202}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r0, 0x8208200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14117e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000480)={'syztnl2\x00', &(0x7f0000000440)={'syztnl1\x00', 0x0, 0x8, 0x7, 0x3, 0x2d, {{0x7, 0x4, 0x0, 0xb, 0x1c, 0x64, 0x0, 0x1, 0x2f, 0x0, @local, @private=0xa010101, {[@timestamp={0x44, 0x8, 0x64, 0x0, 0x6, [0xa4]}]}}}}}) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r1, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8040000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x54, 0x0, 0x1, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xde00}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x4}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x800}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}]}, 0x54}, 0x1, 0x0, 0x0, 0x20040805}, 0x0) r3 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, r3, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r4, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) r5 = syz_open_pts(r4, 0x0) ioctl$TCSETS(r5, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 'JZ-\x00'}) r6 = dup3(r5, r4, 0x0) vmsplice(r6, &(0x7f00000003c0)=[{&(0x7f0000000000)="cc8c1158a49f85acf60b62842ba9c480a6ed9f26c54f82451d9e4d35fda25e7bebd49afc38b388ca860f205bb16d270c52cb562716ab104681a3c3c9abbd88a84c75ba09d7ed4e669899d430363f161e3ffa5667f3744be896c2f8ea3537700d6520d87abbe15d5eafd152b9f544536c7a39b4d4f06fe6bf95b7d8410c8d92ba593d1652084e4fba88f7791331602c4e74df506bde75a1310a2459c8b8", 0x9d}, {&(0x7f00000000c0)="d78d705105ee3e95c41034e7daf83c649389cf2e79262dc09fbe82eba663d36c80f245534a7d85e287317377ba17ec9edc789be286acfbf1fbdd1f012931174091661d3d7191797f6f76c3358bdb", 0x4e}, {&(0x7f0000000140)="2472e4b220e770314f299d24", 0xc}, {&(0x7f0000000180)="e07f798c9ae3b234d1c87d7b64ea2446854654536179aa686dc367827d01ecef2d49886b080da8b0cd7dee4963ad03ef4591355f011c8c033c71561f563d8a5284a3ec7ed03702e4eed31bdd4f7b74382b485be35a3ba9346c037564678b71825bab5902b2b7418c64d99a14926c54c38de0e457057c", 0x76}, {&(0x7f0000000200)="3c30319c9c33b4dcbd3edf75ab8d8c862487c0480619ca887428dd1bf0eb3fef8b89c899f7dde5e6a77191a0072f2001d42a364911709626406e83a66365c21b73590c98eb9abd4eb4a59f9503e293ab", 0x50}], 0x5, 0x1) mmap(&(0x7f0000000000/0x600000)=nil, 0x600e00, 0x7ffffe, 0x4002011, 0xffffffffffffffff, 0x0) [ 438.647201][T23089] ================================================================== [ 438.655325][T23089] BUG: KCSAN: data-race in __io_queue_sqe / tctx_task_work [ 438.662604][T23089] [ 438.664935][T23089] write to 0xffff888123385b40 of 4 bytes by task 23075 on cpu 0: [ 438.672762][T23089] __io_queue_sqe+0x1aa/0x360 [ 438.682395][T23089] io_req_task_submit+0x8e/0x170 [ 438.687615][T23089] tctx_task_work+0x1d4/0x3d0 [ 438.692297][T23089] task_work_run+0xae/0x130 [ 438.698805][T23089] exit_to_user_mode_prepare+0xf8/0x190 [ 438.704353][T23089] syscall_exit_to_user_mode+0x20/0x40 [ 438.709818][T23089] do_syscall_64+0x56/0x90 [ 438.714230][T23089] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 438.720131][T23089] [ 438.722447][T23089] read to 0xffff888123385b40 of 4 bytes by task 23089 on cpu 1: [ 438.730070][T23089] tctx_task_work+0x282/0x3d0 [ 438.734742][T23089] task_work_run+0xae/0x130 [ 438.739321][T23089] exit_to_user_mode_prepare+0xf8/0x190 [ 438.745302][T23089] syscall_exit_to_user_mode+0x20/0x40 [ 438.750763][T23089] do_syscall_64+0x56/0x90 [ 438.755180][T23089] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 438.761078][T23089] [ 438.763387][T23089] Reported by Kernel Concurrency Sanitizer on: [ 438.769521][T23089] CPU: 1 PID: 23089 Comm: syz-executor.1 Not tainted 5.12.0-syzkaller #0 [ 438.778032][T23089] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 438.788084][T23089] ================================================================== [ 440.608989][ T25] kauditd_printk_skb: 77784 callbacks suppressed [ 440.609001][ T25] audit: type=1326 audit(1619743174.893:3346130): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 00:39:34 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='autofs\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2c) tkill(r0, 0x4) wait4(0x0, 0x0, 0x0, 0x0) 00:39:34 executing program 2: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xa88c2, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x9b5ed22be52330ee, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) msync(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x6) 00:39:34 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='pvfs2\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x5) wait4(0x0, 0x0, 0x0, 0x0) 00:39:34 executing program 1: r0 = syz_io_uring_setup(0x2de5, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000400000/0xc00000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_SENDMSG={0x9, 0x4, 0x0, r3, 0x0, &(0x7f0000000200)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x159a, 0x0, 0x0, 0x0, 0x0) io_uring_enter(r0, 0x302, 0x0, 0x0, 0x0, 0x0) 00:39:34 executing program 0: r0 = syz_io_uring_setup(0x2de5, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000400000/0xc00000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_SENDMSG={0x9, 0x4, 0x0, r3, 0x0, &(0x7f0000000200)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x159a, 0x0, 0x0, 0x0, 0x0) io_uring_enter(r0, 0x302, 0x0, 0x0, 0x0, 0x0) 00:39:34 executing program 4: perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10202}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r0, 0x8208200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14117e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000480)={'syztnl2\x00', &(0x7f0000000440)={'syztnl1\x00', 0x0, 0x8, 0x7, 0x3, 0x2d, {{0x7, 0x4, 0x0, 0xb, 0x1c, 0x64, 0x0, 0x1, 0x2f, 0x0, @local, @private=0xa010101, {[@timestamp={0x44, 0x8, 0x64, 0x0, 0x6, [0xa4]}]}}}}}) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r1, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8040000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x54, 0x0, 0x1, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xde00}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x4}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x800}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}]}, 0x54}, 0x1, 0x0, 0x0, 0x20040805}, 0x0) r3 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, r3, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r4, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) r5 = syz_open_pts(r4, 0x0) ioctl$TCSETS(r5, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 'JZ-\x00'}) r6 = dup3(r5, r4, 0x0) vmsplice(r6, &(0x7f00000003c0)=[{&(0x7f0000000000)="cc8c1158a49f85acf60b62842ba9c480a6ed9f26c54f82451d9e4d35fda25e7bebd49afc38b388ca860f205bb16d270c52cb562716ab104681a3c3c9abbd88a84c75ba09d7ed4e669899d430363f161e3ffa5667f3744be896c2f8ea3537700d6520d87abbe15d5eafd152b9f544536c7a39b4d4f06fe6bf95b7d8410c8d92ba593d1652084e4fba88f7791331602c4e74df506bde75a1310a2459c8b8", 0x9d}, {&(0x7f00000000c0)="d78d705105ee3e95c41034e7daf83c649389cf2e79262dc09fbe82eba663d36c80f245534a7d85e287317377ba17ec9edc789be286acfbf1fbdd1f012931174091661d3d7191797f6f76c3358bdb", 0x4e}, {&(0x7f0000000140)="2472e4b220e770314f299d24", 0xc}, {&(0x7f0000000180)="e07f798c9ae3b234d1c87d7b64ea2446854654536179aa686dc367827d01ecef2d49886b080da8b0cd7dee4963ad03ef4591355f011c8c033c71561f563d8a5284a3ec7ed03702e4eed31bdd4f7b74382b485be35a3ba9346c037564678b71825bab5902b2b7418c64d99a14926c54c38de0e457057c", 0x76}, {&(0x7f0000000200)="3c30319c9c33b4dcbd3edf75ab8d8c862487c0480619ca887428dd1bf0eb3fef8b89c899f7dde5e6a77191a0072f2001d42a364911709626406e83a66365c21b73590c98eb9abd4eb4a59f9503e293ab", 0x50}], 0x5, 0x1) mmap(&(0x7f0000000000/0x600000)=nil, 0x600e00, 0x7ffffe, 0x4002011, 0xffffffffffffffff, 0x0) [ 440.640277][ T25] audit: type=1326 audit(1619743174.903:3346131): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 440.665125][ T25] audit: type=1326 audit(1619743174.903:3346132): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 00:39:35 executing program 2: unshare(0x24020400) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x6, 0x0, &(0x7f0000000100)) [ 440.711554][T23105] autofs4:pid:23105:autofs_fill_super: called with bogus options 00:39:35 executing program 2: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000007, 0x10, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400028001000240000004f801", 0x17}, {&(0x7f0000000840)='W', 0x1, 0x600}, {0x0, 0x0, 0x10e00}], 0x0, &(0x7f00000002c0)) mkdirat(r0, &(0x7f0000000040)='./file1\x00', 0x0) getdents(r0, &(0x7f00000003c0)=""/81, 0x51) [ 440.746194][ T25] audit: type=1326 audit(1619743174.903:3346133): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 440.783518][ T25] audit: type=1326 audit(1619743174.903:3346134): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 440.869502][T23126] loop2: detected capacity change from 0 to 270 00:39:35 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000004b00)=[{{&(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10, 0x0, 0x0, &(0x7f0000000100)=[@ip_retopts={{0x28, 0x0, 0x7, {[@noop, @timestamp_addr={0x44, 0x14, 0xd, 0x1, 0x0, [{@empty}, {@dev}]}]}}}], 0x28}}], 0x1, 0x0) [ 440.903855][ T25] audit: type=1326 audit(1619743174.903:3346135): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 440.987447][ T25] audit: type=1326 audit(1619743174.903:3346136): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 00:39:35 executing program 0: r0 = syz_io_uring_setup(0x2de5, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000400000/0xc00000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_SENDMSG={0x9, 0x4, 0x0, r3, 0x0, &(0x7f0000000200)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x159a, 0x0, 0x0, 0x0, 0x0) io_uring_enter(r0, 0x302, 0x0, 0x0, 0x0, 0x0) 00:39:35 executing program 1: r0 = syz_io_uring_setup(0x2de5, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000/0x2000)=nil, &(0x7f0000400000/0xc00000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000000)=0x0) openat(0xffffffffffffff9c, &(0x7f0000002040)='./file0/file0\x00', 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_SENDMSG={0x9, 0x4, 0x0, r3, 0x0, &(0x7f0000000200)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r0, 0x159a, 0x0, 0x0, 0x0, 0x0) io_uring_enter(r0, 0x302, 0x0, 0x0, 0x0, 0x0) [ 441.012768][ T25] audit: type=1326 audit(1619743174.903:3346137): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 441.050323][ T25] audit: type=1326 audit(1619743174.903:3346138): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 00:39:35 executing program 2: setuid(0xee01) r0 = getpgid(0x0) sched_setaffinity(r0, 0x0, 0x0) [ 441.086885][ T25] audit: type=1326 audit(1619743174.903:3346139): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 00:39:38 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='autofs\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2c) tkill(r0, 0x4) wait4(0x0, 0x0, 0x0, 0x0) 00:39:38 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @empty}, 0x10) sendto$inet(r0, &(0x7f0000000200)="af", 0xfffffffffffffdef, 0x4155, 0x0, 0x0) shutdown(r0, 0x1) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0xf99e}], 0x1, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x0) recvmsg(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/45, 0x2d}], 0x1}, 0x22) 00:39:38 executing program 0: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000100)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000080)={0x0, 0x5, 0x0, 0x0, 0x6}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) 00:39:38 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="9400000010000b"], 0x94}}, 0x0) recvmmsg(r0, &(0x7f0000000bc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x4}}], 0x2, 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)) 00:39:38 executing program 4: perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10202}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r0, 0x8208200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000780)='./bus\x00', 0x14117e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r1, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000480)={'syztnl2\x00', &(0x7f0000000440)={'syztnl1\x00', 0x0, 0x8, 0x7, 0x3, 0x2d, {{0x7, 0x4, 0x0, 0xb, 0x1c, 0x64, 0x0, 0x1, 0x2f, 0x0, @local, @private=0xa010101, {[@timestamp={0x44, 0x8, 0x64, 0x0, 0x6, [0xa4]}]}}}}}) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r1, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8040000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x54, 0x0, 0x1, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xde00}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x4}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x800}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}]}, 0x54}, 0x1, 0x0, 0x0, 0x20040805}, 0x0) r3 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, r3, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) write$binfmt_aout(r4, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "00e4d3f26c00000173d5e822a7632200"}) r5 = syz_open_pts(r4, 0x0) ioctl$TCSETS(r5, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 'JZ-\x00'}) r6 = dup3(r5, r4, 0x0) vmsplice(r6, &(0x7f00000003c0)=[{&(0x7f0000000000)="cc8c1158a49f85acf60b62842ba9c480a6ed9f26c54f82451d9e4d35fda25e7bebd49afc38b388ca860f205bb16d270c52cb562716ab104681a3c3c9abbd88a84c75ba09d7ed4e669899d430363f161e3ffa5667f3744be896c2f8ea3537700d6520d87abbe15d5eafd152b9f544536c7a39b4d4f06fe6bf95b7d8410c8d92ba593d1652084e4fba88f7791331602c4e74df506bde75a1310a2459c8b8", 0x9d}, {&(0x7f00000000c0)="d78d705105ee3e95c41034e7daf83c649389cf2e79262dc09fbe82eba663d36c80f245534a7d85e287317377ba17ec9edc789be286acfbf1fbdd1f012931174091661d3d7191797f6f76c3358bdb", 0x4e}, {&(0x7f0000000140)="2472e4b220e770314f299d24", 0xc}, {&(0x7f0000000180)="e07f798c9ae3b234d1c87d7b64ea2446854654536179aa686dc367827d01ecef2d49886b080da8b0cd7dee4963ad03ef4591355f011c8c033c71561f563d8a5284a3ec7ed03702e4eed31bdd4f7b74382b485be35a3ba9346c037564678b71825bab5902b2b7418c64d99a14926c54c38de0e457057c", 0x76}, {&(0x7f0000000200)="3c30319c9c33b4dcbd3edf75ab8d8c862487c0480619ca887428dd1bf0eb3fef8b89c899f7dde5e6a77191a0072f2001d42a364911709626406e83a66365c21b73590c98eb9abd4eb4a59f9503e293ab", 0x50}], 0x5, 0x1) mmap(&(0x7f0000000000/0x600000)=nil, 0x600e00, 0x7ffffe, 0x4002011, 0xffffffffffffffff, 0x0) 00:39:38 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='pvfs2\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x5) wait4(0x0, 0x0, 0x0, 0x0) 00:39:38 executing program 0: set_mempolicy(0x1, &(0x7f0000000000)=0x1ff, 0x7) r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f00000000c0)={0x2}, 0x8, 0x0) 00:39:38 executing program 1: kexec_load(0x0, 0x10, &(0x7f0000000000)=[{0x0, 0x0, 0x12fec8000, 0x3e0000}], 0x0) [ 443.752683][T23168] autofs4:pid:23168:autofs_fill_super: called with bogus options 00:39:38 executing program 2: unshare(0x2000400) r0 = socket$nl_generic(0x10, 0x3, 0x10) connect(r0, &(0x7f0000000080)=@l2, 0x80) 00:39:38 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f0000000980), 0x4) dup3(r0, r1, 0x0) 00:39:38 executing program 1: kexec_load(0x0, 0x10, &(0x7f0000000000)=[{0x0, 0x0, 0x12fec8000, 0x3e0000}], 0x0) 00:39:38 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) write(0xffffffffffffffff, &(0x7f0000000000)="240000001e006700", 0x8) socket(0x10, 0x3, 0x0) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r1, 0x0, r3, 0x0, 0x4ffe3, 0x0) [ 445.618609][ T25] kauditd_printk_skb: 87560 callbacks suppressed [ 445.618621][ T25] audit: type=1326 audit(1619743179.903:3433700): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 445.651151][ T25] audit: type=1326 audit(1619743179.903:3433701): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 445.678532][ T25] audit: type=1326 audit(1619743179.913:3433702): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 445.708709][ T25] audit: type=1326 audit(1619743179.913:3433703): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 445.736231][ T25] audit: type=1326 audit(1619743179.913:3433704): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 445.763272][ T25] audit: type=1326 audit(1619743179.913:3433705): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 445.789321][ T25] audit: type=1326 audit(1619743179.913:3433706): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 445.814466][ T25] audit: type=1326 audit(1619743179.913:3433707): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 445.840194][ T25] audit: type=1326 audit(1619743179.913:3433708): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 [ 445.864873][ T25] audit: type=1326 audit(1619743179.913:3433709): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=13020 comm="syz-executor.2" exe="/root/syz-executor.2" sig=0 arch=c000003e syscall=202 compat=0 ip=0x4665f9 code=0x7fc00000 00:39:41 executing program 2: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) write$P9_RWALK(r0, &(0x7f00000003c0)=ANY=[], 0x8) r1 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x1012, r1, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f0000000680)='./bus\x00', 0x0) ftruncate(r4, 0x800) r5 = openat(0xffffffffffffffff, &(0x7f0000000180)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800001, 0x12, r5, 0x0) preadv(r5, &(0x7f0000000280), 0x18, 0xd9f, 0x0) dup2(r2, r3) 00:39:41 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f0000000980), 0x4) dup3(r0, r1, 0x0) 00:39:41 executing program 1: kexec_load(0x0, 0x10, &(0x7f0000000000)=[{0x0, 0x0, 0x12fec8000, 0x3e0000}], 0x0) 00:39:41 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000002a80)={@private0, @mcast1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x0, 0x0, 0x0, 0x80410010}) 00:39:41 executing program 5: creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x20001000104, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='pvfs2\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x5) wait4(0x0, 0x0, 0x0, 0x0) 00:39:41 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000080)) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x152, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}) ioctl$BTRFS_IOC_INO_LOOKUP(r1, 0xd0009412, &(0x7f00000000c0)={0x0, 0x200}) r2 = signalfd(r1, &(0x7f00000010c0)={[0x5]}, 0x8) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000001140), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_MESH(r2, &(0x7f0000001200)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000011c0)={&(0x7f0000001180)={0x1c, r3, 0x300, 0x70bd2a, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x90) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000001300)={&(0x7f00000012c0)={0x30, r3, 0x800, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0xcaa}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}, @BATADV_ATTR_VLANID={0x6}]}, 0x30}, 0x1, 0x0, 0x0, 0x44050}, 0x4000810) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x54, r3, 0x8, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x9}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x6}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xffff}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x4000}, 0x4000000) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff}, 0x0) lseek(r4, 0x0, 0x0) 00:39:41 executing program 4: r0 = getpid() r1 = pidfd_open(r0, 0x0) r2 = epoll_create1(0x0) r3 = dup3(r1, r2, 0x0) setns(r3, 0x80) 00:39:41 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000140), r0) sendmsg$NLBL_CIPSOV4_C_ADD(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="01000000000000000000010000000400088008000100000000002c000c8014002b8008000a00fcfd0000080009000000000014000b80090009000000000008000a00000000000800020001000000040004"], 0x58}}, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000a, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 00:39:41 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f0000000980), 0x4) dup3(r0, r1, 0x0) 00:39:41 executing program 1: kexec_load(0x0, 0x10, &(0x7f0000000000)=[{0x0, 0x0, 0x12fec8000, 0x3e0000}], 0x0) 00:39:41 executing program 4: syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000001340)={[], [{@uid_eq}]}) [ 446.838671][T23226] netlink: 'syz-executor.2': attribute type 9 has an invalid length. [ 446.847572][T23226] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 00:39:41 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r1, 0x11, 0x64, &(0x7f0000000980), 0x4) dup3(r0, r1, 0x0) 00:39:41 executing program 1: sendmsg$NL80211_CMD_SET_CHANNEL(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x20, 0x0, 0x0, 0x0, 0x25dfdbfe, {{}, {@void, @val={0xc}}}}, 0x20}}, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000080)="20000000000100000c000000ce0000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000100000001000000000000000b00000080", 0xff71, 0x400}, {&(0x7f0000010400)="2e0000001300000023", 0x9, 0x800}, {&(0x7f0000012b00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x8c80}], 0x0, &(0x7f0000013800)) 00:39:41 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000080)) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x152, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}) ioctl$BTRFS_IOC_INO_LOOKUP(r1, 0xd0009412, &(0x7f00000000c0)={0x0, 0x200}) r2 = signalfd(r1, &(0x7f00000010c0)={[0x5]}, 0x8) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000001140), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_MESH(r2, &(0x7f0000001200)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000011c0)={&(0x7f0000001180)={0x1c, r3, 0x300, 0x70bd2a, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x90) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000001300)={&(0x7f00000012c0)={0x30, r3, 0x800, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0xcaa}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}, @BATADV_ATTR_VLANID={0x6}]}, 0x30}, 0x1, 0x0, 0x0, 0x44050}, 0x4000810) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x54, r3, 0x8, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x9}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x6}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xffff}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x4000}, 0x4000000) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff}, 0x0) lseek(r4, 0x0, 0x0) 00:39:41 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000140), r0) sendmsg$NLBL_CIPSOV4_C_ADD(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000680)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="01000000000000000000010000000400088008000100000000002c000c8014002b8008000a00fcfd0000080009000000000014000b80090009000000000008000a00000000000800020001000000040004"], 0x58}}, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x180000a, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 00:39:41 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000080)) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @dev}, {0x2, 0x0, @broadcast}, 0x152, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}) ioctl$BTRFS_IOC_INO_LOOKUP(r1, 0xd0009412, &(0x7f00000000c0)={0x0, 0x200}) r2 = signalfd(r1, &(0x7f00000010c0)={[0x5]}, 0x8) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000001140), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_MESH(r2, &(0x7f0000001200)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000011c0)={&(0x7f0000001180)={0x1c, r3, 0x300, 0x70bd2a, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x90) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(0xffffffffffffffff, &(0x7f0000001340)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000001300)={&(0x7f00000012c0)={0x30, r3, 0x800, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0xcaa}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @local}, @BATADV_ATTR_VLANID={0x6}]}, 0x30}, 0x1, 0x0, 0x0, 0x44050}, 0x4000810) sendmsg$BATADV_CMD_SET_HARDIF(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x54, r3, 0x8, 0x70bd2b, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x9}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x6}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0xffff}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x4000}, 0x4000000) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff}, 0x0) lseek(r4, 0x0, 0x0) [ 446.939213][T23241] ISOFS: Unable to identify CD-ROM format. [ 447.019948][T23259] netlink: 'syz-executor.2': attribute type 9 has an invalid length. [ 447.029889][T23259] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 447.087967][T23241] ISOFS: Unable to identify CD-ROM format.